How does a ransomware attack start?

How does a ransomware attack start?

When you read about the ransomware attacks, such as those on Honda, Garmin, Toll, Fisher and Paykel and Lion, it’s easy to think these attacks only target large enterprises. Unfortunately, that would be a mistaken view. The reality is that all businesses are under...
International eSecurity Compliance

International eSecurity Compliance

It feels it’s like a daily occurrence for one of our clients to be asking for assistance with a security compliance questionnaire from their client. Most of these are being driven by corporates with international footprints. This becomes complex as each...
Damn – I just “corrupted” that document

Damn – I just “corrupted” that document

It happens to all of us. The IT geeks tell us all to save our work to the cloud (or server for those still  to move), but it’s just so convenient to have it on the desktop. We all do it.  It could be a spreadsheet you want to work on or a document that a client shared...