Cyber Attack Related Content
3 reasons to adopt a critical event management plan in 2023
What are the top 3 trends that will trigger organizations to adopt a critical event management plan in 2023? Gartner reveals all.
Ransomware attacks remain the most acute threat to organisations
Ransomware attacks continue to be the most dominant threat to UK organisations and are having catastrophic consequences on critical national infrastructure.
What cybersecurity trends can we expect to see in 2023
As organisations become increasingly digital, adopting new technologies, applications and services, what can we expect from cybersecurity in the next 12 months?
Cybercrime is on the rise, is your business prepared?
Richard Andreae, CEO of SupPortal UK Ltd discusses cybercrime threats and how to efficiently protect your business with cyber security.
How to avoid and recover from cyber and ransomware attacks
Best practices for public sector organisations to avoid and quickly recover from cyber and ransomware attacks.
Will Rishi Sunak reassess UK cybersecurity policies?
UK cybersecurity policies are outdated, says Illumio Director; will Rishi Sunak address the problem?
How to protect the Active Directory from cyber attacks
Semperis Chief Technologist and Microsoft MVP alumnus Guido Grillenmeier and Director of Sales Dan Bowdrey discuss Active Directory and cyber attacks.
Public and private sector cooperation is vital in controlling cybersecurity threats
The recent cybersecurity threats on the U.K.’s national health service (NHS) demonstrate the necessity for better national protection against cyberattacks.
October is Cybersecurity Awareness Month: Are you prepared?
Martin Roots, Managing Director at the Expede Group, discusses cybersecurity awareness, walking us through different cyber attacks and how to prevent them efficiently.
The healthcare industry’s identity security diagnosis
Ensuring identity security in the healthcare industry is vital post-pandemic, as the NHS faces more cyber threats than ever. Here's how we can better protect healthcare data.
Montenegro and cyberattacks: all NATO states should be prepared
Keiron Holyome, VP UKI, Eastern Europe, Middle East and Africa at BlackBerry discusses cyberattacks and the public sector.
How to prevent cyber attackers’ manipulation of the democratic process
With GCHQ's recent warning that voting was subject to a cyber attack, what can we do to avoid manipulation of the democratic process?
Hermit Spyware: Who discovered it and why is it dangerous?
Open Access Government interviews Justin Albrecht, the man behind the discovery of Hermit Spyware in Italy and Kazakhstan.
Cyber security threats on the rise: how should organisations react
Organisations face the growing risk of becoming victims of cyber security threats - what can they do to avoid them?
An increase in cyber attack fines highlights firms’ need to tighten security
One in five companies that has been the victim of a cyber attack has felt the increased financial impact of a substantial cyber attack fine.
Why we need a cyber-resilient public sector
With UK councils targeted with an average of 10,000 cyberattacks every day, building a cyber-resilient public sector is becoming ever more important.
Why government must heed real-time data management trends
Real-time data is the lynchpin for any progressive government, enabling it to improve efficiency, enhance operations and communications, provide improved services for citizens, uncover fraud and lower the risk of cyberattacks.
Hybrid working is here to stay – now secure your workforce
The rise of hybrid working has enabled greater flexibility for employees, laying bare a wealth of opportunities for organisations.
Protecting against cyber threats from nation states
Looking at the cyber threats posed by nation states, organisations must assess their own risk and prioritise defences against them accordingly.
Escalating supply chain cyber-attacks need a strategic response
Stuart Jubb, Group Managing Director at Crossword Cybersecurity, outlines the need for a more strategic and collaborative approach to maintain visibility of supply chain attack threats.