Computer Viruses

January 24, 2019
Startup business security risk

Security for startups: why early-stage businesses can’t neglect this risk

In the early days of a startup, it’s easy to get caught up in the buzz of building a new business. Keeping so many plates spinning […]
January 18, 2019

It’s oh so quiet: get ready for stealthy malware in 2019

It’s unlikely we’ll ever look back fondly to a time when ransomware would announce itself noisily. But at least victims knew they were under attack. Now, […]
October 26, 2018
EU Cybersecurity Month logo

EU Cyber Security Month roundup – advice on staying secure

During October, BH Consulting has been sharing daily advice about digital security and privacy on its social media channels as part of EU Cyber Security Month. […]
June 8, 2018

“You have all these silver bullets but not every threat is a werewolf”

Attendees at FutureScope got an insight into how cybersecurity threats have evolved from a technical concern to a business risk. Last week’s business networking conference in […]
May 10, 2018
A person looking at a screen showing static, signifying security news

Security newsround: May 2018

We round up reporting and research from across the web about the latest security news and developments. This month: police success against cyber villains, the value […]
April 3, 2018

Ransomware reminders force focus on prevention and planning

Ransomware reared its ugly head again recently, with some stark reminders that it’s still a serious business risk. A household name suffered what seemed a major […]
March 7, 2018
A person looking at a screen showing static, signifying security news

Security newsround: March 2018

We round up reporting and research from across the web about the latest security news. This month: cryptomining attacks increase, data breaches rise in Ireland, the […]
January 5, 2018

Meltdown and Spectre vulnerability guidance

On January 3rd 2018, researchers at Google’s Project Zero team announced vulnerabilities, dubbed Spectre and Meltdown, in modern computer processors (CPUs) which could allow an attacker […]