How to Respond to a Data Subject Access Request (DSAR)
Under EU and UK law, individuals have the right to know what personal data an organisation processes about them and…
Under EU and UK law, individuals have the right to know what personal data an organisation processes about them and…
Multiple spam campaigns targeting Bolivia, Chile, Mexico, Peru, and Portugal have been linked to a banking trojan called Mispadu that…
EXECUTIVE SUMMARY: Sometimes, there are valid reasons to turn your camera off during a Zoom or Teams meeting. For example,…
EXECUTIVE SUMMARY: In a new report, cyber security researchers have highlighted just how widespread malware threats really are, illuminating the…
A cancer patient whose naked medical photos and records were stolen by a ransomware gang and posted online has sued…
Emotet malware returns after three months break and uses Microsoft OneNote attachments to avoid macro-based security restrictions. Threat actors initially…
In January, a Go-based botnet named HinataBot (named after the character from the popular anime series Naruto) was discovered exploiting…
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world…
By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy…
By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in…