Before allowing junior administrators to take on solo projects of their own a few organizations hand them huge responsibilities for them to gain some on-the-job experience. Specific administrative access is delegated to user accounts so they can... Read more
Last week through our blog post we established that organizations need to conduct cybersecurity vulnerability assessments on a regular basis to secure their sensitive data ensuring their networks and systems cannot be exploited. However, a failu... Read more
Dridex is back to tormenting users again. It has marked its return with a phishing attack pretending to be invoiced from QuickBooks. The ongoing campaign that started on the 19th of April 2021 is targeting users of the accounting software and in... Read more
Let us start the article with a few questions – Do you frequently use the internet? Can you consider your mobile as your digital lifeline? Have you installed a lot of applications on your smartphone? If you have positively answered any of the ab... Read more
The industry of cybercrime is one of the largest in the world. And yet, details of the number of people involved in it are unknown. This industry involves groups and organizations of various sizes. Some groups have formal organizations while oth... Read more