Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

Watch out for Online Identity Theft

on 13-Jan-2020 09:54:38 By | Andrew Allen | 1 Comment | Cybersecurity Technology
In this day and age, most of us spend our time online. Whether it’s on social media, online shopping or informative pages – you’ll find it hard to disagree with us that crucial information related to ourselves dwells in the online world.
Read More

Hackers strike again with a new Ransomware plot.

on 30-Dec-2019 10:06:28 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Ransomware gangs have signalled to publish the data stolen from victims who refuse to pay the ransom. Cybercriminals behind the Maze ransomware have erected a website on the public internet that identifies recent victim companies that opted not to pay a ransom. Ransomware gangs have now upped the ante of their attacks to cause massive losses for victim organisations. They have signalled to publish the data stolen from victims who refuse to pay the ransom.
Read More

Cybersecurity in 2019: Expectation Vs Reality

on 30-Dec-2019 10:05:37 By | Andrew Allen | 0 Comments | Cybersecurity Technology
In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tools and techniques to meet the challenges posed by the latest cyber threats. In fact, many also predicted last year about how the attack tactics of adversaries would grow, what technologies would play a critical role in shaping the future of cybersecurity, and more.
Read More

The Most Common Passwords Found From Breaches in 2019

on 30-Dec-2019 10:05:02 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course the password ‘password’. A bunch of independent anonymous researchers composed a list of 200 most popular passwords that were leaked in data breaches during 2019 and shared it with security firm NordPass.
Read More

Liverpool can help lead the Fourth Industrial Revolution

on 13-Nov-2018 11:35:18 By | Keith Smith | 0 Comments | Connectivity IT News Technology
For Liverpool the future is exciting! Last week the Aabyss team attended the 2018 Liverpool City Region Digital Summit hosted by LCR Activate, and what an event it was.
Read More

Malicious Fax Flaws Leave Businesses Exposed

on 14-Aug-2018 16:27:01 By | Jack Whisker | 0 Comments | IT News Security Technology
Fax machines have moved from office essential to dust collector in the space of 15 years. The development of the internet and printers outdated the fax machine quicker than most expected. Despite this, as printers are often all-in-one fax machines can still be found in the majority of offices and whilst forgotten about they can pose a big security risk.
Read More

Align Your IT and Business Strategies

on 15-May-2018 10:16:30 By | Andrew Allen | 0 Comments | Strategy Technology
The Successful Business "If you want to climb a mountain, start at the top of the mountain." Implicit within this analogy is an underlying need. That need is for C-Suite executives to know how each department, function, team and individual will be performing when the business is successful.
Read More

Have you entered the Internet of Things?

on 14-Feb-2018 16:36:35 By | Jack Whisker | 1 Comment | Connectivity IT News Strategy Productivity Technology
Have you entered The Internet of Things (IoT) yet?
Read More