Attacks Targeting Managed Service Providers
Cyber criminals are targeting managed service providers (MSPs), companies to which others outsource the administration of their IT infrastructure.
Attacks Targeting Managed Service Providers Read More »
Cyber criminals are targeting managed service providers (MSPs), companies to which others outsource the administration of their IT infrastructure.
Attacks Targeting Managed Service Providers Read More »
This article will hopefully help to explain what end-of-lifing means to you, as well as steps you can take to ensure that you can be secure in a year.
This Too Shall Pass: Windows 7 and software end-of-lifing Read More »
Mitigate Cyber Security are happy to introduce a brand new, redesigned Web site. The new site features a cleaner, clearer design and is fully responsive to all device screen sizes.
Mitigate Has a New Site Read More »
A recent article in IEEE Security & Privacy—“Teaching Authentication as a Life Skill”—detailed the results of a team of Swiss researchers and their attempts to
Authentication as a Life Skill Read More »
Ransomware attacks are amongst the most-discussed new threats to have emerged in the past few years, but what is ransomware, how can it impact your business and how can you protect yourself against it?
The Threat of Ransomware Read More »
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the
GDPR – Secure Coding – Security by Design for Web Applications With The OWASP TOP 10 Read More »
Ultimately, whether you in-source or out-source your security, or some hybrid of the two, you will need a range of tools and services to ensure you make a success of it. Luckily, Mitigate Cyber Security have something for every occasion.
Whether In-sourcing or Out-sourcing Your Security, Mitigate Has You Covered Read More »
Talk to any cyber security professional and one of the first things you’ll notice is frustration. Despite all the advice out there on how to
The Psychology of Security Read More »
2018 proved to be an expensive year for a number of firms, both major and minor, around the globe. An IBM report suggested that the
Europol’s 2018 Internet Organised Crime Threat Assessment reported that ‘[m]obile malware [was] absent in law enforcement reporting, but industry reports [a] growing volume’ of such
The ‘butterfly effect’ is a popular way of explaining chaotic systems to non-mathematicians—the flapping of a butterfly’s wings in one country contributes, however slightly, to
Breaches and Butterfly Wings: How data loss fuels further phishing Read More »
You may have talk about the idea that we are now entering a ‘fifth generation’, or ‘Gen V’, of cyber security. You may have wondered
What is ‘Gen V Cyber Security’? Read More »
Previously, we detailed a number of cyber-threats that wealth management firms face, and some of the available solutions. This second part will detail some additional threats not previously mentioned.
Cyber Security for Wealth Managers: Part 2 Read More »
The UK wealth management industry has a complacency problem. Mitigate provide a range of services to help mitigate the risks of doing business.
Cyber Security for Wealth Managers Read More »
The requirements for Cyber Essentials has been centralised under the banner of the National Cyber Security Centre and the updates of the framework were launched
GCHQ Certified Cyber Essentials Consultancy training Read More »