Cyber Security

Brexit = No Exit From GDPR

Oliver Pinson-Roxburgh | Posted 21.08.2017 | UK Tech
Oliver Pinson-Roxburgh

The list of things that will change when Brexit comes into effect is almost immeasurable. What will remain the same, however, is the impact of the General Data Protection Regulation (GDPR) ruling on data regulations in the UK. Despite Brexit, GDPR will still have a seismic impact on businesses who use and store EU data.

How Much Would Your Spotify Account Be Worth?

Nicholas Shaw | Posted 27.07.2017 | UK Tech
Nicholas Shaw

You can buy pretty much anything on the internet. You just need to know where to look. For most of us, the only times we'd venture off the beaten track would be to find a specialist birthday gift perhaps, or a niche item you spotted on Pinterest, Facebook or Reddit. But what might surprise you is that in some places, your digital belongings could also be listed for sale - all at rock bottom prices.

Are Cyber Thieves And Snoopers Turning Your Smart Home Against You?

Peter Turner | Posted 14.07.2017 | UK Tech
Peter Turner

As our homes become jam-packed with smarter devices in the years to come, they may help to makes our lives easier. At the same time, if they are not secured, they also can make the lives of cyber criminals easier by giving access to our whole network and all the devices on it. To be truly safe in our smart homes then we need to start applying the same security principles we already do with our mobile phones and computers.

How AI Might Transform The Landscape Of Cybersecurity

Waqas Khan | Posted 22.06.2017 | UK Tech
Waqas Khan

While cybercriminals quickly learn to use emerging technologies for their own benefit, it's the most ripe time to delve into the thought process on how artificial intelligence will fit into cyber security infrastructure of businesses and with AI still in the early stages, it's time to work on strategies to utilise it fully once it marks its second coming in the business world.

Cyber Security Innovation Is Vital To The Protection Of Shareholder Confidence

Greg Sim | Posted 20.06.2017 | UK Tech
Greg Sim

The post mortems about the widespread WannaCry ransomware attack in May have tended to overlook the most common consequences of cyber-attacks - the da...

Top Three Trends Of Cyber Security In 2017

Sheheryar Ahmed Khan | Posted 09.06.2017 | UK Tech
Sheheryar Ahmed Khan

2016 was an interesting year, to say the least, when it comes to cyber security. Cyber-attacks set a record in 2016, with big names like Yahoo! LinkedIn, Tumblr, Ashley Madison, and Tesco all being successfully infiltrated. And according to most cyber security experts, cyber-attacks will get more dangerous and frequent in 2017.

The Only Way To Shut Out Ransomware Like WannaCry And Its Nasty Imitators

Greg Sim | Posted 31.05.2017 | UK Tech
Greg Sim

No matter who is responsible, what might reduce WannaCry's victims to tears is the knowledge that none of this would have happened had their organisations had effective email security in place. The hackers who perpetrated this massive cyber-attack will almost certainly have used a simple email attachment to gain admission to their victims' respective systems.

'Why All The Questions? I'm Already A Loyal Customer'

John Abbott | Posted 31.05.2017 | UK Tech
John Abbott

How many bags would you like? Do you have a loyalty card? Can you scan it? What payment method do you want to pay with? Are you over 18 or do you look under 25? Wow. And I only popped in for a packet of crisps and a newspaper for my train home... OK, and a bottle of red to go with dinner.

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

A Ransom Note From Your Coffee-Machine Is No Joke, But It's Not The Only Threat

Greg Sim | Posted 06.04.2017 | UK Tech
Greg Sim

Why have gadgets and devices suddenly become linked to cyber security and ransomware? Cyber criminals are not stupid - they are after your money, not the glory of hacking into your internet-connected coffee-maker or heating system.

The Next Generation Cyber Technologies Being Used To Defend Businesses

Bryan Lillie | Posted 31.03.2017 | UK Tech
Bryan Lillie

The upcoming CyberUK should act as the starting point for this, bringing all aspects of industry, tech developers, cyber experts and OEM's together under the umbrella of the new strategy, ensuring the UK creates a safe cyberspace for everyone.

Cyber Defenders Of The Future Must Be Given The Opportunity To Put Theory Into Practice

Dr Frank Stajano | Posted 27.03.2017 | UK Tech
Dr Frank Stajano

Cyber security competitions give pupils the opportunity to implement the skills and theory they have been taught at university in a realistic environment, while learning new ones in the process, which will help grow them in to the cyber defenders of the future.

Seven Security Tips That Will Make Your Digital Life Infinitely Better

Jyoti Agrawal | Posted 27.03.2017 | UK Tech
Jyoti Agrawal

One of the worst things that can happen is to have your credit card number stolen and be thousands of dollars in debt for purchases you didn't make. A more common scenario, however, is to get infected by malware that only compromises the performance of your device or the quality of your online browsing experience.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

The Evolution Of Cyberspace

Bryan Lillie | Posted 17.03.2017 | UK Tech
Bryan Lillie

When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry. The iPhone had only just launched; Facebook was still in it's infancy; the Internet of Things (IoT) was still a dream.

Just How Safe Are Our Mobile Apps?

Alastair Paterson | Posted 16.03.2017 | UK Tech
Alastair Paterson

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

Real CEO, Fake CEO: Who Is The Biggest Enterprise Threat?

Mike Foreman | Posted 06.03.2017 | UK Tech
Mike Foreman

With so much at stake and so much already invested in security systems to then allow cybercriminals a way into the organization that's completely beyond the IT department's control is the business equivalent of shooting yourself in the foot.

How Safe Is Your Child Online?

Estelle Lloyd | Posted 06.03.2017 | UK Parents
Estelle Lloyd

So I ask you, how is riding a bike any different from using the internet? We need to nurture our children, explain right from wrong, make them aware of the dangers lurking around every corner and to always think

How To Create A Cyber Security Playbook

Paul Rose | Posted 22.02.2017 | UK Tech
Paul Rose

All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.

Terrorism And Critical Infrastructure

Dr Ion Jinga | Posted 16.02.2017 | UK
Dr Ion Jinga

Protection of Critical Infrastructure has become a priority issue for states, in reaction to the growing risks posed by terrorism. All governments rec...

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

The Headlong IoT Gold Rush Is Undermining Security And Making Our Smart Homes Dumb

Yossi Atias | Posted 14.02.2017 | UK Tech
Yossi Atias

But smart devices are also dumb. They can't fend off cyber-attacks, they won't alert us if somebody is probing our device from the Internet, and they won't raise a red flag if suspicious activity is detected on our network.

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

2017 - The Year We All Need To Become Cyber Smart

Vince Warrington | Posted 12.01.2017 | UK Tech
Vince Warrington

Businesses - as well as the general public - will consequently have to get smarter and more agile if they don't want to fall victim to an increasingly sophisticated and well-coordinated network of cyber gangs.