<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">

Mitigating Ransomware Attacks

Ransomware Attacks In 2020


The debate of whether or not organisations should pay ransoms to cybercriminals in return for their unencrypted data has been going on for years. On one hand, as data is now the lifeblood of almost all organisations a successful ransomware attack can mean business closure. However, succumbing to the ransom is only fuelling the cybercrime economy which is now estimated to be the 3rd largest in the world. But a recent report into ransomware attacks may add weight to the notion of never paying the ransom.

Read More

Tags: Cyber Threats, Cyber Security, Phishing, backup, air gap backup, security awareness training

Posted by David Taylor on 17-Jun-2020 12:02:50

Secure with Celerity 15.05.2020

In this week's episode of Secure with Celerity  we were joined by Celerity  Lead Cyber Security Analyst, Josh Read and  Celerity Business Development, Chris McCartney.

Read More

Tags: Cyber Threats, Security, Cyber Security, Data Breach, Cyber News, Data Protection

Posted by David Taylor on 18-May-2020 13:15:09

Secure with celerity 07.05.2020

In this week's episode of Secure with Celerity  we were joined by Celerity Technical Atchitect - Cyber Security, Steve Laidler and  Lead Cyber Security Analyst, Josh Read.

Read More

Tags: Cyber Threats, Security, Cyber Security, Data Breach, Cyber News, Data Protection

Posted by David Taylor on 10-May-2020 17:10:11

Adopting A Layered Approach To Phishing

In 2019, cyber criminals are finding smarter and more integrated ways to target companies and individuals.

Read More

Tags: Cyber Threats, Cyber Security, Cyber-Attacks, Phishing, layered approach to security

Posted by Steven Laidler on 30-Oct-2019 17:20:51

A guide to spotting a phishing email

Phishing is a major security threat for modern businesses. Knowledge of what is, and isn’t a phishing email varies, with many employees at risk of falling foul to malicious emails.

Read More

Tags: Cyber Threats, Cyber Security, Cyber-Attacks, Phishing

Posted by David Taylor on 24-Oct-2019 15:15:00