risks

  • Blog

    Is AirDropping safe? Learn the risks and how to AirDrop safely

    Is AirDropping safe? Mostly yes, but only if you know how to use it right. Apple’s file-sharing feature encrypts transfers and keeps them off the internet, but things can still go wrong if you’re careless with your settings or accept files from strangers. Below, we’ll cover how it works and what makes AirDropping so safe. Then we’ll go over the…

    Read More »
  • Blog

    Poor software testing risks software outages

    Two-thirds of organizations globally are at risk of a software outage over the next year – and the UK’s doing worse than most. Companies are centered on productivity, with 45% focused on improving delivery speed and only 13% on enhancing software quality. More than six-in-ten are shipping code without having fully tested it. And as a result, testing firm Tricentis…

    Read More »
  • Blog

    Yes, connected accessories are security risks, too

    Yesterday, we looked at how tariffs might well make connected accessories more expensive and leave existing devices less secure as the companies that made them exit the market. Today, we discover why these accessories need to be protected and find out they can already be attacked. If nothing else, it should encourage any consumer or enterprise user relying on connected accessories to…

    Read More »
  • Blog

    CISA warns of increased breach risks following Oracle Cloud leak

    On Wednesday, CISA warned of heightened breach risks after the compromise of legacy Oracle Cloud servers earlier this year and highlighted the significant threat to enterprise networks. CISA said, “the nature of the reported activity presents potential risk to organizations and individuals, particularly where credential material may be exposed, reused across separate, unaffiliated systems, or embedded (i.e., hardcoded into scripts,…

    Read More »
  • Blog

    Open source risks threaten all business users – it’s clear we must get a better understanding of open source software

    Open source systems are now deeply embedded across technology stacks, from Android devices to mission-critical enterprise systems and, of course, AI. There are businesses built on open source, and organisations that have an open source first policy. And there are countless other businesses that use at least some open source, somewhere, in their operations. Other surveys show that open source…

    Read More »
  • Blog

    Security Risks and Strategies in LCNC Automation

    Low-code/no-code (LCNC) platforms have revolutionized the way organizations develop and deploy software applications. These platforms enable users with little to no programming experience to create functional applications through intuitive drag-and-drop interfaces, pre-built templates, and visual development tools. LCNC automation offers significant advantages in terms of speed, cost-efficiency, and accessibility; it also introduces a range of security concerns. This article explores…

    Read More »
  • Blog

    What is a shared IP address? What are the risks?

    If you know a little about VPN services, there’s a chance you might have heard of something called a shared IP address. As the name suggests, this is an IP address that multiple people use at the same time. Shared IP addresses are common with every VPN service, but some also sell dedicated IP addresses for an extra fee. Shared…

    Read More »
  • Blog

    What is data hoarding and what are the risks?

    Data hoarding occurs when people or organizations save excessive digital data, often without a clear need. Whether it’s photos, old documents, or backups, this habit can lead to so-called digital clutter, security risks, and even legal issues. People hoard data for many reasons: anxiety over losing meaningful data, strict workplace policies, or simple neglect. The result? Increased costs, tougher compliance,…

    Read More »
  • Blog

    Strategies for guarding against emerging cyber risks and invisible threats

    Businesses are facing an ever-expanding landscape of cyber threats. Generative AI, for example, has rapidly transformed industries, introducing breakthroughs in productivity and efficiency. From generating content to uncovering insights and automating workflows, AI-powered tools are reshaping the modern business landscape. However, as AI systems grow more integral to business operations, the cyber threats targeting them are becoming increasingly sophisticated. The…

    Read More »
  • Blog

    Legal professionals face huge risks when using AI at work

    US law firm Morgan & Morgan has told its staff to stop using AI because it could make up case law — and presenting that in a court filing was a fireable offense. The law firm, which specializes in personal injury claims, warned two staff members for using the technology earlier this month. The lawyers in question have been sanctioned…

    Read More »
Back to top button
close