The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

You Should Prepare For The Next Mega Data Breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the...

Security-Minded Employees Still Pose Risks

Despite their training and best intentions, even the most security-minded employees behave in ways that put the enterprise at risk, according to The Security Culture Report 2018. The report, which covered eight industry sectors, surveyed more than 21,000 employees who...

How To Spot A Phishing Email

Phishing emails are the most common way for criminals to distribute malicious software or obtain sensitive information. Is your business safe from these attacks? We have some tips that you can follow to make sure your business doesn’t become a victim! In a previous...

SMBs Fear Phishing, Fall Short On Cyber Training

In surveying 500 small to medium-sized businesses (SMBs) across the US, Webroot discovered that many fail to recognize the many cybersecurity threats their businesses face, in large part because they lack in-house security expertise. According to The 2018 Webroot SMB...

New Xbash Malware A Cocktail Of Malicious Functions

The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities. Adding to the rapidly growing list of multi-functional malware, a particularly nasty – and unique — data-destroying malware tool has...

Tor Browser 8 Is Out: What’s New?

Version 8 of Tor Browser, the multi-platform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest version The Tor Browser is based on a modified Mozilla Firefox ESR web browser and includes...

APIs: The Trojan Horses Of Security

At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API) can serve as a gateway to the data...

Microsoft Starts Rolling Out New Office Online UI

Microsoft seems to be toying with two different versions of the simplified ribbon. On the picture above, for example, Word Online has the more modern looking UI for the ribbon, while PowerPoint Online and Word Online below has a different, slightly modern ribbon UI....