About Mike Casey

This author has not written his bio yet.
But we are proud to say that Mike Casey contributed 174 entries already.

Entries by Mike Casey

Foodora Data Breach Impacts Customers in 14 Countries

Online food delivery service Delivery Hero has confirmed a data breach affecting its Foodora brand. The cybersecurity incident has exposed the account details of hundreds of thousands of customers in 14 different countries. Delivery Hero told Infosecurity Magazine that the exposed data consists of “unique email addresses as well as certain customer details: encrypted password hashes, name, first name, delivery address, and phone […]

46% of SMEs Sharing Confidential Files by Email During Lockdown

Nearly half (46%) of small and medium-sized enterprises (SMEs) regularly share confidential files via email, including financial and employee data in spreadsheets, according to a new study from the Lanop Accountancy Group. This is despite the fact that 60% have not upgraded their organizations’ cybersecurity capabilities since shifting to remote working during COVID-19. In a survey of […]

Our approach to Managed IT

Who? What? Where? We’re Cloudscape, a full-service IT company based in the heart of London.  Working primarily with small to medium-sized companies, we offer a full complement of IT support services covering all bases; from routine maintenance and remote monitoring to IT project management, consultancy and much more. We draw on over 30 years of […]

Cyber attack forces Aussie beer giant Lion to shut operations

Australian brewery giant Lion announced Wednesday that it suffered a major cyberattack that forced it to shut down its IT systems, resulting in a disruption to the supplies of beer to suppliers and customers. The lion is Australia’s largest brewer, brewing popular beer brands such as Corona, Budweiser, Guinness, and Becks as well as local […]

Five Tips to Secure Office 365

If you’re moving to the Microsoft cloud, you’re not alone: Office 365 adoption continues to increase, with 180 million monthly active users. But while migrating your data to the cloud offers numerous collaboration and productivity benefits, it can also pose data protection and compliance challenges. Here are five best practices you can follow to keep your data […]

Covid-19 – IT support expectations

Covid-19 and the subsequent lockdown has had a profound effect on all our lives and presented huge challenges to businesses great and small. Many businesses have been forced to close, and many of those able to continue trading have been forced to adapt-to-survive by adopting new technology and ways-of-working to facilitate remote operations. While the […]

Hackers steal secrets from US nuclear missile contractor

  Hackers have stolen confidential documents from a US military contractor which provides critical support for the country’s Minuteman III nuclear deterrent, Sky News has learnt. After gaining access to Westech International’s computer network, the criminals encrypted the company’s machines and began to leak documents online to pressure the company to pay extortion. It is […]

Covid 19 – Is your IT support provider failing to deliver?

The Covid-19 crisis has presented considerable challenges to most businesses.  For some it has meant having to close completely, while others have had to overcome severe operational challenges as they make every effort to maintain some sort of normal service to their clients. With the recommended advice being to work from home wherever possible, many […]

easyJet Says Details of Nine Million Customers Accessed in Data Breach

easyJet has revealed that the personal data of approximately nine million of its customers has been accessed following a “highly sophisticated” cyber-attack on its system. This includes credit card details of a small subset of these customers (2208), with the airline confirming it has already taken action to contact and offer support to those individuals. For […]

The Fort of Cyber Security – What is Data Encryption?

Encrypt your data before the Hackers do it for you… What exactly is Data Encryption? Encryption helps protect data you send, receive and store using any device. Including text messages, emails on your desktop, phone calls, banking information and most importantly, password logs. It works in a simple manner, by scrambling the readable text so […]