Blog Articles

Just Paid the Ransom? Here’s How to Prevent It From Happening Again

Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you…

Cyber-Attack Grounds Flights in Alaska

RavnAir Group was forced to ground flights on Saturday following a cyber-attack on the Alaskan company's computer network. In a statement released on Saturday morning, RavnAir wrote: On Friday, December 20th, RavnAir Group…

Data Leak Exposes 267 Million Facebook Users

A database of 267 million Facebook user IDs, phone numbers, and names was left exposed online for a fortnight thanks to another cloud misconfiguration, according to researchers. The trove was likely to have been the result of an illegal…

Citrix Vulnerability Puts 80K Companies at Risk

A critical flaw has been discovered in two Citrix products, placing 80,000 companies in 158 countries at risk.  The easily exploitable vulnerability could allow attackers to obtain direct access to a company's local network and to access…

Key elements of successful social media recruiting.

Social media is becoming more and more prominent in the recruitment process. Most recruiting companies are now taking advantage of social media to increase their reach to onlooking candidates and clients. As a result, the competition between…

My role as a social media apprentice explained.

I am approaching the end of my first month in my new position as a Social Media and Digital Marketing Apprentice at XL Recruitment. Therefore, I thought it appropriate that now was a good time to explain my role in achieving the ongoing…