Cyvatar, based in Fareham, Hampshire and Orange County, California, is making ransomware protection accessible to all via a monthly subscription model. The company has received more than $12 million in funding in the eight months since it opened for business. In September 2020, it received $3 million from Bill Wood Ventures followed by a further […]
NEWS
UK ransomware attacks double in a year
A new report by cyber security and data analytics firm CybSafe shows that ransomware attacks in the UK doubled in the first half of 2021 compared to the same period in 2020, with almost a quarter of the incidents reported to the Information Commissioner’s Office (ICO) relating to ransomware attacks, up from just over 10% […]
VFX artist spills the beans on how it’s done
This Unilad video on Facebook by a young Canadian VFX artist gives us a great behind-the-scenes look at how he created four simple but effective illusions using compositing software, some of it free and open source.
ICAEW online briefing: tech trends affecting accountants today
Join the ICAEW London & East Region for an online breakfast briefing on Tuesday 7 September on the impact of major technology trends such as AI, Blockchain, Cyber Security, Data Analytics and Ethics on businesses The Institute of Chartered Accountants for England & Wales (ICAEW) is organising an online breakfast briefing for businesses at 8.30am […]
Ransomware, the accountants’ perspective
The Colonial Pipeline in the US. JBS Foods, the world’s largest meat producer and the the Irish health service have all been high profile victims of ransomware attacks in the last year, but it’s not just utilities and large-scale operations who need to be alert to the threat. Small and medium-sized businesses with poor security […]
Infrastructure operators must up their cyber security game
Following recent high profile exploits, industrial infrastructure operators such as electricity grids, oil and gas facilities and manufacturing plants are being urged more and more to take steps to fend off ransomware attacks and nation-state-backed hacking operation by tightening up their security. Ignoring these pleas could have dire consequence. To prevent attackers from gaining access […]