Blog

Blog

Ransomware attacks: How to protect against real-life data hostage threats

Ransomware attacks: How to protect against real-life data hostage threats

Ransomware attacks: How to protect against real-life data hostage threatsThe plot of every Hollywood movie ever made about hostage for ransom situations always ends in the same way: the hero saves the day and the villain goes to jail. But real life isn’t always a movie, and holding data for ransom is becoming more common. In fact, ransomware attacks are on the rise across verticals. Ransomware is a type of malicious software, or malware, that bad actors use to restrict access to data until the target pays a fee

Read More >

What is digital identity?

What is the digital identity?

What is digital identity?As more of our everyday activities shift online, from grocery shopping and mortgage applications to school exams, the ability to trust other people’s digital identities is critical. But unfortunately, it’s getting harder to make sure people online actually are who they say they are. Identities online can be challenging… Specifically, there’s a lack of streamlined, interoperable fraud solutions designed to manage the complexity of today’s online environments. There are more ways to interact online than ever before. Users log in

Read More >

SIM Swap Fraud: How this 90s technology has stood the test of time

The early 1990s was a time of boy bands, neon windbreakers and flat top haircuts. It was also the start of the dotcom boom, with the invention of the World Wide Web and the explosion in the adoption and use of internet technologies. Among those rising stars was the Subscriber Identity Module, better known as the SIM card. The introduction of the SIM card revolutionized the telecommunications industry. This tiny piece of technology was an easily removable, portable memory chip

Read More >