
Log4j Vulnerability Guidance
In December 2021, a critical vulnerability found in a Java-based software shook-up the internet and had businesses on red alert…
Your secret admirer
14th February 2022
Saint Valentine’s Day. A celebration of love and adoration. A day when many people around the world receive gifts and cards from loved ones, and occasionally, from a secret admirer.
But what if that person unknown to you had more sinister reasons to be watching you from afar? A hacker monitoring you, collecting intelligence into your business operations before breaching your systems and holding you to ransom. This is the reality for many businesses who fall victim to cyberattacks. Sometimes the approach is targeted and sometimes opportunistic, but almost always devastating to a business.
Here’s a reminder that threat actors operate at all times, even when love is in the air.
These simple steps will help keep your business protected:
Your secret admirer
14th February 2022
Get in touch today to start your free trial of Defense.com™ and discover how we can help you take the stress out of your cybersecurity.
In December 2021, a critical vulnerability found in a Java-based software shook-up the internet and had businesses on red alert…
Cyberwarfare is a present-day threat when conflict between two nations develop, with…
Microsoft Defender for Business has now thrown its hat into the ring by providing an endpoint…
Over the years we have observed how the IT security industry has served small businesses, with limited options available to effectively…