Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Cyber Essentials: Malware Protection

...often feature the use of a command-and-control server that allows attackers to communicate with the infected systems, exfiltrate sensitive data and remotely control the compromised device or server. An attack...

Post

Implementing ISO 27001

...for managing information security, helping organisations protect sensitive data, reduce risks and meet their compliance requirements. It strengthens your security posture, builds trust and creates a resilient ISMS (information security...

Post

Cyber Essentials vs ISO 27001: Key Differences

...access via password-based attacks – brute forcing, for example, or data scraping. These are basic, but extremely common, and can cause a lot of damage if successful, so implementing a...

Post

Cyber Security Consultancy Services

...to data breaches, downtime and compliance failures. Our consulting service gives you clarity and confidence by: Identifying vulnerabilities in your physical and environmental security. Advising on best-practice controls from security...

Post

Your CVSS Questions Answered

...all breaches’, which saw more than 26 billion records leaked. Today, we’re chatting to him about the CVSS (Common Vulnerability Scoring System), finding out more about: What the framework is;...