Author name: ITM Tech

Insider Threats Are Getting More Dangerous. Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorised connection. Because insiders have authorised system access, they bypass certain security defences. Such as those designed …

Insider Threats Are Getting More Dangerous. Here’s How to Stop Them Read More »

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer issues a patch to fix the vulnerability. But it’s not long before a new feature …

The Biggest Vulnerabilities that Hackers are Feasting on Right Now Read More »

How To Watch Out For Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may wish to; Steal employee login credentials Launch a ransomware attack for a payout. Or possibly plant spyware to steal sensitive business information. Sending a phishing email …

How To Watch Out For Reply-Chain Phishing Attacks Read More »

Top 5 Mobile Device Attacks You Need to Watch Out For

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. It’s no surprise that we’re seeing the mobile takeover of many activities that used to be performed on traditional computers.  For example, Microsoft estimates that up to 80% …

Top 5 Mobile Device Attacks You Need to Watch Out For Read More »

What Are The Warning Signs That My Computer May Be Infected With Malware?

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses Ransomware Spyware Trojans Adware Keyloggers The longer that malware sits on your system unchecked, the …

What Are The Warning Signs That My Computer May Be Infected With Malware? Read More »