Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s ...

Fileless malware: who are the targets?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” ...

Popular printer brands are prone to attacks

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, ...

Attacks on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe ...