Category: IT SECURITY GURU

Community Corner: CybAid

Community is exceptionally important to the team at the IT Security Guru. We believe that building community and supporting one another is where our industry thrives, that’s why we’re platforming charities and networks that work within the industry, as well…

Telcos Hit Hardest by Cloud Malware, Report Finds

Telecom companies are being targeted by malicious actors at an alarming rate, according to a new report by Netskope Threat Labs. The report highlights a concerning trend of attackers exploiting popular cloud apps like Microsoft OneDrive and GitHub to deliver…

Defending your ever-changing attack surface

The very elements crucial for a business’s functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas,…

Why ransomware is still important to business resilience

Ransomware may be an old technique, however, due to increasing levels of digital connectivity, are witnessing a proliferation of ransomware attacks in recent years, which pose significant threats to individuals, businesses, and entire industry sectors industries.   Ransomware, in its current…

Men’s Mental Health Week: Resource Guide

10th – 16th June 2024 is International Men’s Mental Health Week. It may feel like there are too many ‘awareness dates’, however this week is especially important. Men are far less likely to talk about mental health than women (it…

Is Your Business Under Attack From AI?

Artificial Intelligence (AI) is highly innovative but also poses significant risks to all organisations, as shown by the recent high profile hacks at Ticketmaster, Santander and the NHS. This article will delve into how AI can be manipulated by cyber…

Strategies to Manage and Reduce Alert Fatigue in SOCs

The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two…

Elevating threat detection and response to a new level

Cybersecurity platforms have emerged as indispensable assets for threat detection, response and management. They proactively keep tabs on network traffic, user behaviour and system activities to identify and mitigate risks before they escalate into potentially catastrophic breaches. Yet, the efficacy…

5 Tips for Improving Your Business Security

When it comes to data security, you might think of firewalls, encryption, or vulnerability scanning. However, many businesses overlook the role of physical security in safeguarding their card data. However, there are numerous methods for data thieves to gain access…