Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

Supply-chain ransomware attack cripples thousands of car dealerships

Supply-chain-ransomware-attack-cripples-thousands-of-car-dealerships_BlogHeader
Car dealerships have been brought to a standstill across the United States after a software provider was hit by a ransomware attack.
Continue reading
  103025 Hits

Ransomware attacks skyrocket, with LockBit 3.0 at the forefront

Ransomware-attacks-skyrocket-with-LockBit-_20240628-132716_1
Newly-released research indicates that ransomware attacks reached a record high in May, with the surge primarily fueled by a massive increase in the number of attacks perpetrated by the LockBit ransomware group and its affiliates.
Continue reading
  98927 Hits

The new breed of seamless, secure cashflow emerges: Ensuring your organisation is prepared for the payments revolution

THE-NE1
We make payments, large and small, every day of our lives. From paying our bills and making payments to friends online, to the large-scale bank transfers that help business flow. Money changes hands through a wider range of channels and platforms than ever before, to the extent the days of cash-in-hand being the default payment model are a fading memory for many of us. The convenience and flexibility can't be disputed, but as with any emerging technology, the new flows of data must be given careful consideration, ensuring businesses and customers alike can rest assured that their money will remain secure throughout every stage of every transaction.
Continue reading
  382 Hits

UK Government ponders major changes to ransomware response – what you need to know

BLOG-H1

What's happened? 

Recorded Future has reports that the British Government is proposing sweeping change in its approach to ransomware attacks.

Continue reading
  117495 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

The-Key-to-Establishing-Ironclad-Remediation-and-Disaster-Recovery-Processes_Heade_20240322-102320_1

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

Continue reading
  639 Hits

3.5 million Omni Hotel guest details held to ransom by Daixin Team

3.5-million-Omni-Hotel-guest-details-held-to-ransom-by-Daixin-Team_Blog-Header

The international hotel chain Omni Hotels & Resorts has confirmed that a cyberattack last month saw it shut down its systems, with hackers stealing personal information about its customers.

In the aftermath of the attack, hotel guests reported that they had been forced to check in on paper, that room keys didn't work, and all phone systems and Wi-Fi were offline.

Continue reading
  85220 Hits

What does the ICO’s new fining guidance mean for your organisation?

What-does-the-ICOs-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

Continue reading
  775 Hits

Ransomware: lessons all companies can learn from the British Library attack

Ransomware-lessons-all-companies-can-learn-from_Blog-Banne_20240322-175134_1

In October 2023, the British Library suffered "one of the worst cyber incidents in British history," as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world's greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

Continue reading
  76806 Hits

What makes a ransomware attack eight times as costly? Compromised backups

blog-header-what-makes-a-ransomware-attack-eight-times-as-costly

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

Continue reading
  100540 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

blog-header-legal-remediation-offering-clients-the-ultimate-peace-of-mind

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

Continue reading
  491 Hits

The true meaning of digital transformation (it’s more than just reorganisation and technology)

blog-header-the-true-meaning-of-digital-transformation

After several years of serious global upheaval, it is clear that resilience, agility, and the ability to adapt to the unexpected are critical priorities for all organisations – regardless of size or sector. However, this accelerated pace of change has, in many cases, revealed the limitations of existing IT services. With an increasing emphasis on on-demand services and a highly fluid workforce, legacy services and their systems often struggle to support new propositions and customers' evolving needs, which will – in turn – make maintaining a competitive advantage difficult, if not near impossible.

Continue reading
  1983 Hits

A tech-powered customer experience for the new era of financial services

A-tech-powered-customer-experience-for-the-new-era-of-financial-services

From day-to-day consumer banking to high-profile asset and wealth management, the way we all access financial services is changing in ways that would have been inconceivable just a few years ago. Online banking is now firmly established, allowing customers to manage their money securely within a few clicks - anytime, anywhere and without the need to visit a branch. A 2022 survey revealed that the quality of the online experience was a key factor in 81% of adults' choice of bank1.

Continue reading
  1409 Hits

What is a ‘critical third party’, and why must the Finance sector’s technology providers be ready to earn this designation?

WHAT-I1

As a long-standing technology partner for multiple financial organisations across the UK, the team at Exponential-e have been observing the sector's evolving relationship with technology for some time - both the growing demand for a higher standard of operational resilience, and an increasing awareness of the challenges and opportunities that Cloud transformation presents.

Continue reading
  2926 Hits

Maintaining operational resilience in a changing Finance sector

blog-header-Maintaining-operational-resilience-in-a-changing-Finance-sector

The Finance sector has always been one of the most dynamic, rapidly evolving industries, and this shows no signs of changing any time soon. But while shifts in the landscape may well open new opportunities, they will also come with new challenges, and it is the organisations who are ready and able to face these head-on who will continue to thrive in the years ahead.

Continue reading
  1276 Hits

The importance of securing your data - Part 2: Data Loss Prevention tools

The-importance-of-securing-your-data-Part-2-Data-Loss-Prevention-tools

All organisations store data, and regardless of whether it's a recipe or an algorithm, this data is an organisation's most prized asset, which is why hackers make it their target. The Cyber Security Breaches Survey 2019 from the Department for Digital, Culture, Media & Sport (DCMS) found that 32% of businesses identified cyber security breaches or attacks in the last 12 months, which have cost an average of £4,180 in lost data and assets

Continue reading
  2125 Hits

Three steps to more secure employee passwords on World Password Day

Three-steps-to-more-secure-employee-passwords-on-World-Password-Day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

Continue reading
  1756 Hits

Why is Object Storage the right solution to underpin your Artificial Intelligence, Machine Learning, Big Data, and IoT analytics strategies?

Why-is-Object-Storage-the-right-solution-to-underpin-your-Artificial-Intelligence-Machine-Learning-Big-Data-and-IoT-analytics-strategies

Selecting the right storage architecture is essential for organisations that are leveraging Artificial Intelligence (AI), Machine Learning (ML), Big Data and IoT analytics. For example, AI applications that involve scientific and medical research create and interact with numerous large files, and therefore need a storage system that can scale to a petabyte level, with zero restrictions. Similarly, ML applications and Big Data projects require a scalable, cost-effective storage solution to accommodate the high volumes of data that will be produced. This raises the question of which storage solution enterprises should use to underpin their overall analytics strategies.

Continue reading
  2554 Hits

Technology and the third sector: a positive force for social change

Technology and the third sector: a positive force for social change

"Not-for-profit organisations have provided a trusted and valued source of independent advice for people throughout England for many years. They are a vital part of our national support infrastructure and somewhere to turn to in times of crisis."

Nick Hurd, MP

Continue reading
  2612 Hits

Hackers work 24 / 7 to penetrate your network, so ensure it's genuinely protected 24 / 7

Hackers-work-24-7-to-penetrate-your-network-so-ensure-its-genuinely-protected-24-7

It's well-established that security is an essential part of all infrastructure. With data protection more of a concern for customers and end users than ever - particularly in light of regulations like the Cloud Act and GDPR - it's vital that organisations demonstrate a clear commitment to the security of their networks, Cloud applications and physical devices.

Continue reading
  3062 Hits

The truth about Vulnerability Management and Pen Testing

The-truth-about-Vulnerability-Management-and-Pen-Testing

No matter how sure you are that your network is secure, you may still be at risk of cyberattacks. It's no exaggeration Cybercriminals are constantly working to stay one step ahead of organisations and security professionals, exploiting any vulnerability they can in even the most sophisticated systems.

Continue reading
  2951 Hits