Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

Tandem Money

Tandem-Money-Maximising-performance-scalability-and-compliance-for-a-leading-innovator-in-online-banking

Maximising performance, scalability, and compliance for a leading innovator in online banking About Tandem Money Tandem is 'The Good Green Bank', a fu...

Continue reading
  2126 Hits

Black Basta ransomware group's techniques evolve, as FBI issues new warning in wake of hospital attack

BLACK-1
Security agencies in the United States have issued a new warning about the Black Basta ransomware group, in the wake of a high-profile attack against the healthcare giant Ascension.
Continue reading
  7503 Hits

$10 million reward offer for apprehension of unmasked LockBit ransomware leader

10-million-reward-offer-for-apprehension-of-unmasked-LockBit-ransomware-leader_Blog-Header

Do you know Dmitry Yuryevich Khoroshev?

If you do, there's a chance that you might well on the way to receiving a reward of up to $10 million.

Law enforcement agencies across the US, UK, and Australia have named Dmitry Yuryevich Khoroshev as the mastermind behind the notorious LockBit ransomware group, estimated to have extorted $500 million from companies worldwide.

Continue reading
  9873 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

The-Key-to-Establishing-Ironclad-Remediation-and-Disaster-Recovery-Processes_Heade_20240322-102320_1

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

Continue reading
  461 Hits

3.5 million Omni Hotel guest details held to ransom by Daixin Team

3.5-million-Omni-Hotel-guest-details-held-to-ransom-by-Daixin-Team_Blog-Header

The international hotel chain Omni Hotels & Resorts has confirmed that a cyberattack last month saw it shut down its systems, with hackers stealing personal information about its customers.

In the aftermath of the attack, hotel guests reported that they had been forced to check in on paper, that room keys didn't work, and all phone systems and Wi-Fi were offline.

Continue reading
  64172 Hits

Solving the Culture Conundrum in Software Engineering

Dev Ops Consultant at Exponential-e, Alistair Doran, write for 'Tech Native', discussing Software engineering and the cultural changes needed to move ...

Continue reading
  497 Hits

Danger, bots at work: the risk of botnets for businesses

Paulo Henriques, Head of Cyber Security Operations at Exponential-e, writes for 'Global Banking and Finance', discussing the cyber security steps busi...

Continue reading
  544 Hits

What is the modern day CISO prioritising as cyber-risks continue to surge?

Chief Innovation office at Exponential-e, Jonathan Bridges, speaks to 'Intelligent Ciso' about the importance of having a robust cyber security plan i...

Continue reading
  474 Hits

Data Privacy Week: Cyber and data privacy experts share their views.

Tom Richardson, Cloud Sales Specialist for Media at Exponential-e, speaks to Technology Dispatch about the importance of protecting sensitive data by ...

Continue reading
  557 Hits

Science for the everyman

Head of Public Sector at Exponential-e, David Lozdan, speaks to City AM about the investments in data-driven digital healthcare and how this is effect...

Continue reading
  439 Hits

International Women’s Day – How can we encourage and retain women in tech?

Amy Springford, Director of Client Relations at Exponential-e, speaks to SheCanCode, discussing the importance of inclusivity in the workplace and how...

Continue reading
  414 Hits

How four technology uses could transform the public sector

Afshin Attari, Director of Public Sector and Unified Platforms, writes for 'Government Transformation Magazine' discussing the four core technologies ...

Continue reading
  302 Hits

Defending Your Organization Against Ransomware

Our Chief Innovation Officer, Jonathan Bridges, writes for 'Security Boulevard' about the importance of understanding and preparing for ransomware att...

Continue reading
  299 Hits

What does the ICO’s new fining guidance mean for your organisation?

What-does-the-ICOs-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

Continue reading
  503 Hits

Ransomware: lessons all companies can learn from the British Library attack

Ransomware-lessons-all-companies-can-learn-from_Blog-Banne_20240322-175134_1

In October 2023, the British Library suffered "one of the worst cyber incidents in British history," as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world's greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

Continue reading
  76467 Hits

What makes a ransomware attack eight times as costly? Compromised backups

blog-header-what-makes-a-ransomware-attack-eight-times-as-costly

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

Continue reading
  99977 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

blog-header-legal-remediation-offering-clients-the-ultimate-peace-of-mind

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

Continue reading
  205 Hits

Don’t go Soft: The Case for Teams Direct Routing

Dont-go-Soft-The-Case-for-Teams-Direct-Routing

Now more than ever, effective collaboration and communication are the keys to success. Throughout 2020, we saw a widespread shift in how we interact with each other, both in and out of work, and how we stay connected to our colleagues and customers. Just consider the following:

Continue reading
  2040 Hits

The 12-18-3 method - opening the door to accelerated innovation and continuous learning

The-12-18-3-method---opening-the-door-to-accelerated-innovation-and-continuous-learning

The digital landscape is evolving at a rate that's never been seen before and is set to continue accelerating in the years ahead. In such a fast-paced environment, the ability to work flexibly, responding to unexpected challenges and optimising the time-to-market for new innovations, is critically important for all organisations - whether they're ambitious start-ups or established global leaders. While IT infrastructure must certainly support this - hence the widespread phasing out of legacy infrastructure in favour of increasingly sophisticated Cloud transformation strategies - any new technology will be of limited effectiveness if processes and methodologies do not evolve in parallel.

Continue reading
  1586 Hits

The true meaning of digital transformation (it’s more than just reorganisation and technology)

blog-header-the-true-meaning-of-digital-transformation

After several years of serious global upheaval, it is clear that resilience, agility, and the ability to adapt to the unexpected are critical priorities for all organisations – regardless of size or sector. However, this accelerated pace of change has, in many cases, revealed the limitations of existing IT services. With an increasing emphasis on on-demand services and a highly fluid workforce, legacy services and their systems often struggle to support new propositions and customers' evolving needs, which will – in turn – make maintaining a competitive advantage difficult, if not near impossible.

Continue reading
  1811 Hits