The Cyber Spy

How far would your competitors go to get hold of your intellectual property and trade secrets? Corporate or Industrial Espionage is the term used for the covert (and usually illegal) practice of gathering private and confidential company information, data, trade secrets, business plans, product specifications or formulas using human or

Read more

The Leap Frog

When it comes to safeguarding against a critical data breach, we often focus our primary efforts and investment on protecting networks from external threats.  Statistics show that 73% of data breaches are external attackers [1]. But, as this month’s issue of the Tech Grinch proves, the danger can also be lurking right

Read more

The Identity Bandits

Christmas might have been and gone. But what did we risk in the pursuit of those last-minute gifts and January sales bargains? The festive period often leads us into a false sense of security due to our increased desire to purchase and track gift purchases online. We’re often too busy

Read more