5 Steps to Preparing for the GDPR

The implementation of the General Data Protection Regulation (GDPR) means stricter data protection rules for companies that sell or market services or products in the EU and heftier fines for organisations that do not comply with the new legislation. Here are five tips for preparing your organisation for the GDPR.

Read more

“Project Shield:” Open Source DDoS Protection Platform

Project shield safeguards online news and free expression to defend freedom of information and help uphold the democratic process within the Internet society. It protects some of the most vulnerable victims of Distributed Denial of Service (DDoS) attacks for free, by taking applications from news and political organizations, independent journalists and election monitoring organisations. It defends these users against cyber attacks and crimes using a reverse proxy. This allows websites to direct all traffic, both real traffic and spam traffic from cyber attacks, through Project Shield, which filters and catches the malicious traffic.

Read more

Detecting Cryptocurrency Mining Malware with Machine Learning

As with many internet experiences, hackers and scammers are alive and well. From identity theft and fraud to false sales and more, threats are out there and non protected devices are at risk. Cryptocurrency mining is no different, with hackers standing to make thousands or even millions if their scams and schemes come to fruition.

Read more

Ransomware

The Evolution of Ransomware and What It Means for Your Business

Ransomware attacks have been a hot topic in the news these days, but this type of malicious activity has actually been happening for years.  Over time, it has become more sophisticated, and the attacks are more damaging than ever.  The best way for business leaders to prevent a threat to their company is to understand the issue.  In this article, we’ll explore its history and discuss how this type of malicious software has evolved over the years.

Read more

GDPR Extortion Attempts Are on the Rise Says Trend Micro

Antivirus and cybersecurity tech firm Trend Micro recently announced that GDPR extortion attempts are on the rise, with cybercriminals likely gearing up to attach larger organizations as they work to ensure compliance with the European Union privacy laws. Hackers and scammers can hold companies hostage by leveraging the power to take over control on vital aspects of these corporations if they gain access to their Internet of Things (IoT) devices or other devices on their network.

Read more

How Cisco’s New Encrypted Traffic Analytics Protect Your Network

Protect your network and files from unauthorized access by taking every possible step to prevent hackers from compromising your systems. Cisco has just announced the release of its encrypted traffic analytics (ETA) software that will stop attacks in their tracks and move you out of harm’s way. While hackers will encrypt malicious files and exploits to keep their attacks under the radar, ETA can even read and analyze encrypted malware, stopping it before it causes harm. Having ETA on your network will offer an extra layer of safety and give you peace of mind.
Ransomware

Ransomware, And How To Protect Your Business From It

If you are like other business owners, you store vital information on your networks, like customer data, and project details. Not many business owners understand the risks related to cyber attacks. They never take steps to protect themselves from ransomware, which is a dangerous trap.

Read more

Lenovo

Lenovo releases cutting edge, yet simple authentication experiences

Lenovo has recently announced that they would be working with Intel to bring safer, more direct solutions to users by integrating FIDO-certified authenticators into their upcoming PC devices. Intel Online Connect (available on 7th and 8th Generation Intel Core processors) is a service that would allow a user quick and easy access to all their essential websites while doubling down on tougher security and encryption methods. EMPR currently sells Lenovo spare parts for laptops, desktops, and workstations. Click here to see our vast product range.

Read more

Cybersecurity In The Workplace Is Everybody's Business

Cybersecurity In The Workplace Is Everybody’s Business

Cybersecurity must be a focus at every level of modern organizations. In the modern office world, employees are jumping between websites and applications all day long, accessing them from both company-owned equipment and their own mobile devices. Cybersecurity should be a priority at all levels of the organization to secure themselves from cyber threats.

Read more

How to Use Experiential Security Planning For Your Business

After the recent round of ransomware attacks of wanna-cry, the business world got a serious wake-up call, with many having no strategy for these sort of attacks. However, by using experiential planning, you can ride out the storm with no issues.

What is a ransomware?

This is a type of malicious software from crypto-virology that involves threats to publish classified information or initiate perpetual blockage to such data on condition that the ransom sought is not paid. Ransomware usage by cybercriminals has been on the rise as more government agencies and private firms continue adopting e-data storage systems. Cyber criminals seek to kidnap sensitive data or use lock screen attacks as the means through which they can compel their victims into paying the ransom they ask. In the past decade, many firms and organizations have been victims of ransomware leading to increased awareness of the need to take steps that will ensure they are safe. As more firms adopt the use of big data, there is anticipation that more cases of ransomware are likely to be on the rise.

Read more