Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.

LastPass Hack: Developer Was Targeted At Home
Company reveals that one engineer - one of four with access to decryption keys - was targeted as part of last summer's attack on the password manager.

Journalist Breaks Bank Security With AI Voice
Bank security called into question after journalist bypasses voice ID system with AI replica

Top Apps Use False Safety Flags In Google Play Store
TikTok, Twitter and others accused of using "misleading" safety labels in Google Play Store

The three biggest business risks of BYOD (and why you can’t ignore them)
It's tempting to ignore the risks that BYOD (bring your own device) adds to your business, but our security expert provides a better solution.

SMS shutdown: secure your twitter account now
Forget paying Elon Musk for the privilege of two-factor authentication. Here's how to secure your Twitter account without paying for Twitter Blue.

Hyundai and Kia patch TikTok car theft hack
Hyundai and Kia are issuing emergency software updates to combat a USB hack that makes it easy to steal certain US car models.

Are ransomware gangs getting too greedy?
As the Royal Mail refuses to pay criminals to unlock its data, we investigate whether greed is getting the better of ransomware groups.

Fake news: why it could endanger your business and what you can do about it
Believe it or not, fake news is a very real danger to businesses. Vicky Woolaston explains how it can hurt you and what measures you can take to protect yourself.

Internet Explorer ripped out of Windows 10
Attempts to open Internet Explorer in Windows 10 will end in Edge, warns Microsoft

Cyberattacks: why small businesses should be worried
What can you learn from a small business owner who was almost made bankrupt by a cyberattack? We speak to them and the security experts to find out.

What are VPNs?
VPNs are a key tool for any businesses that implement remote working, and have their uses for individuals too. Here's how they work.

What is ransomware?
Ransomware attacks are big business but affect businesses of all sizes. Here, we explain how it works and how to best defend against it.

What is confidential computing?
Attackers target data when it’s at rest and in transit, but they also really want data being processed. Confidential computing is your guard.

What is endpoint security?
Endpoints are any devices that connect to your network - and a common target for hackers. Which is where endpoint security comes in.

Why Identity & Access Management (IAM) must be your primary security layer
A layered approach to cybersecurity is not just best practice: it’s essential. But as threats evolve, which should be your primary layer for defending against attackers?

US Treasury warns that improper use of computing may put financial firms at risk
The US Department of Treasury (USDT) has issued a warning to financial institutions that they are putting themselves at risk by using cloud-based services with undue care.

Is Windows’ built-in Defender Antivirus good enough for business?
Smaller businesses can probably get away with the free version of Defender built into Windows, but there are many caveats.

Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…

Guards vs Firewalls: Ensuring Secure Data Transfer
Learn when software guard technology may be a better solution than available firewall technologies. Government and commercial entities are constantly on alert to prevent and…

The Future of the Firewall
Achieving a stronger posture today while building a bridge to meet tomorrow’s business and security demands The purpose of this white paper is to discuss…