Latest cybersecurity publications


Data protection in a cyber-sensitive world
Proper IT asset disposal (ITAD) is increasingly becoming a vital enterprise consideration and is an industry growing in sophistication, writes John Shegerian Electronic devices are being switched out at a faster pace than we have ever seen before in history. At the rapid rate that technology is improving, businesses, government agencies, and individuals are all... Read the full article

Reliable Huawei defended by Canadian telco Telus

As critics lament Huawei ‘hysteria’, Western telcos are being forced to take sides The feud between the US and China over hardware giant Huawei shows no signs of relenting, leading to increasing numbers of western telcos taking a stance in favour or against the Shenzhen hardware provider. One telco – Canada’s Telus – is one of… Read the full article


Businesses in the dark over IoT breaches

Research indicates almost half of companies cannot tell if IoT devices have been breached Businesses are failing to implement effective IoT security strategies and almost half have no idea if their devices have been breached, according to security company Gemalto. Since the term IoT was coined, experts have sounded the alarm about the dangers of increasing… Read the full article


The blasé attitude of SMEs towards cybersecurity must end
Don’t bet your SME business on a hunch that the cybergangs will leave you alone. The overwhelming odds are that they have already attacked you at least once and that they will attack again in 2019, writes David Kay The 2018 CyberSecurity headlines were bold and gloomy. Some big names got the sort of publicity... Read the full article

Cryptocurrency malware still king of cyber threats

Coinhive retains number one spot for 13th month in a row, impacting 12 percent of organisations Cryptocurrency plundering software remains the most prevalent form of malware identified by security firm Check Point, which warns of a sudden boost in cryptojacking activity. The firm’s monthly top ten list of prevalent malware threats pinpoints Coinhive as the most distributed form of… Read the full article