Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.
Australian Banks increase scam protection as complaints rise
Westpac has announced a slew of measures to protect its customers against the growing menace of scams, including a four-hour payment delay
Confessions of an IT Manager: why I say “no” when you ask me for something new
If you've ever wondered why IT departments never approve the purchase you're asking for, our (mostly) friendly IT manager has the answer. But you may not like it.
Securing Microsoft 365
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences
Redefining Data Loss Prevention (DLP)
Why insider threat management should be a critical part of your data loss prevention program.
2023 State of The Phish in Asia-Pacific
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.
Protecting the End User
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.
The simple step you can take to protect your business against cyberattacks
The CEO of cyber-threat specialist SE Labs explains why spending money on cybersecurity solutions isn't enough on its own - you need to take control.
LastPass Hack: Developer Was Targeted At Home
Company reveals that one engineer - one of four with access to decryption keys - was targeted as part of last summer's attack on the password manager.
Journalist Breaks Bank Security With AI Voice
Bank security called into question after journalist bypasses voice ID system with AI replica
Top Apps Use False Safety Flags In Google Play Store
TikTok, Twitter and others accused of using "misleading" safety labels in Google Play Store
The three biggest business risks of BYOD (and why you can’t ignore them)
It's tempting to ignore the risks that BYOD (bring your own device) adds to your business, but our security expert provides a better solution.
SMS shutdown: secure your twitter account now
Forget paying Elon Musk for the privilege of two-factor authentication. Here's how to secure your Twitter account without paying for Twitter Blue.
Hyundai and Kia patch TikTok car theft hack
Hyundai and Kia are issuing emergency software updates to combat a USB hack that makes it easy to steal certain US car models.
Are ransomware gangs getting too greedy?
As the Royal Mail refuses to pay criminals to unlock its data, we investigate whether greed is getting the better of ransomware groups.
Fake news: why it could endanger your business and what you can do about it
Believe it or not, fake news is a very real danger to businesses. Vicky Woolaston explains how it can hurt you and what measures you can take to protect yourself.
Cyberattacks: why small businesses should be worried
What can you learn from a small business owner who was almost made bankrupt by a cyberattack? We speak to them and the security experts to find out.
What are VPNs?
VPNs are a key tool for any businesses that implement remote working, and have their uses for individuals too. Here's how they work.
What is ransomware?
Ransomware attacks are big business but affect businesses of all sizes. Here, we explain how it works and how to best defend against it.
What is confidential computing?
Attackers target data when it’s at rest and in transit, but they also really want data being processed. Confidential computing is your guard.
What is endpoint security?
Endpoints are any devices that connect to your network - and a common target for hackers. Which is where endpoint security comes in.