About Mike Casey

This author has not written his bio yet.
But we are proud to say that Mike Casey contributed 171 entries already.

Entries by Mike Casey

Cyber attack forces Aussie beer giant Lion to shut operations

Australian brewery giant Lion announced Wednesday that it suffered a major cyberattack that forced it to shut down its IT systems, resulting in a disruption to the supplies of beer to suppliers and customers. The lion is Australia’s largest brewer, brewing popular beer brands such as Corona, Budweiser, Guinness, and Becks as well as local […]

Five Tips to Secure Office 365

If you’re moving to the Microsoft cloud, you’re not alone: Office 365 adoption continues to increase, with 180 million monthly active users. But while migrating your data to the cloud offers numerous collaboration and productivity benefits, it can also pose data protection and compliance challenges. Here are five best practices you can follow to keep your data […]

Covid-19 – IT support expectations

Covid-19 and the subsequent lockdown has had a profound effect on all our lives and presented huge challenges to businesses great and small. Many businesses have been forced to close, and many of those able to continue trading have been forced to adapt-to-survive by adopting new technology and ways-of-working to facilitate remote operations. While the […]

Hackers steal secrets from US nuclear missile contractor

  Hackers have stolen confidential documents from a US military contractor which provides critical support for the country’s Minuteman III nuclear deterrent, Sky News has learnt. After gaining access to Westech International’s computer network, the criminals encrypted the company’s machines and began to leak documents online to pressure the company to pay extortion. It is […]

Covid 19 – Is your IT support provider failing to deliver?

The Covid-19 crisis has presented considerable challenges to most businesses.  For some it has meant having to close completely, while others have had to overcome severe operational challenges as they make every effort to maintain some sort of normal service to their clients. With the recommended advice being to work from home wherever possible, many […]

easyJet Says Details of Nine Million Customers Accessed in Data Breach

easyJet has revealed that the personal data of approximately nine million of its customers has been accessed following a “highly sophisticated” cyber-attack on its system. This includes credit card details of a small subset of these customers (2208), with the airline confirming it has already taken action to contact and offer support to those individuals. For […]

The Fort of Cyber Security – What is Data Encryption?

Encrypt your data before the Hackers do it for you… What exactly is Data Encryption? Encryption helps protect data you send, receive and store using any device. Including text messages, emails on your desktop, phone calls, banking information and most importantly, password logs. It works in a simple manner, by scrambling the readable text so […]

Ransomware Costs Could Reach $70m

IT services giant Cognizant has admitted that a ransomware attack it suffered back in April may end up costing the company as much as $70m. The firm announced revenue of $4.2bn for the first quarter of 2020, an increase of 2.8% year-on-year. In this context, the $50-70m hit it expects to take in Q2 from the ransomware attack will […]

Data Breach Exposes Four Million Dating App Users

Almost four million users of a popular Android dating app have had their personal and log-in data stolen by hackers, according to Risk Based Security. The security vendor said it found the data on a prominent hacking forum — now free for anyone to access, although it had been previously up for sale. It’s associated with […]

The Fort of Cyber Security – What is Malware?

The existence of Malware is to cause chaos, don’t invite it into your Business What exactly is Malware? Malware is a contraction of malicious software. The pieces of software that are specifically designed with the intent of causing damage to devices, the aim of stealing private data or to simply cause destruction and chaos. Often […]