Understanding The Cyber Kill Chain

An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity.
Cyber Security – The current state of play and how you can protect your business.

As part of their thought leadership series, our partners at Microwarehouse held an online event entitled “Cyber Security: The Current State of Play”. The event was moderated by Guido Marchetti – Microsoft Modern Work & Security Lead at Microwarehouse and the speakers included Des Ryan – Director of solutions and cyber security for Microsoft Ireland, […]
3.2 Billion Email Credentials Leaked Online – How Do You Protect Your Credentials?

Earlier this month it was revealed that hackers now have access to over 3 billion emails and passwords. This is being called the largest data breach of all time and actually consists of a combination of smaller data breaches that have occurred over the past several years. Named the Compilation of All Breaches, or COMB […]
Sextortion Email Scam

Sextortion email scams have been around for quite some time and every now and then a new wave will target the inboxes of unsuspecting victims. This once again appears to be the case and we have noticed an increase in requests for advice on how to handle this.