Cyber Security

Don't Get Dazzled by the Shiny New Threat

Graham Welch | Posted 17.04.2015 | UK Tech
Graham Welch

The reality is that while new threats and headlines catch our attention and dazzle us all - the majority of cyberattacks taking place today around the world are using tried and test techniques which exploit often well-known risks and vulnerabilities.

Criminals Shopping for Your Data

Graham Welch | Posted 01.04.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

A World of Mobile Delights - and Dangers

Graham Welch | Posted 09.03.2015 | UK Tech
Graham Welch

As the transition away from relatively easy to manage corporate laptops and desk-bound computers, personal tablets and smartphones gathers pace, it's no surprise that hackers are choosing these mobile devices as their next target.

People Remain the Weakest Link in Security

Graham Welch | Posted 09.03.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

Mass Police Raids On UK Hackers

The Huffington Post UK/PA | Posted 06.03.2015 | UK Tech

A suspected hacker from Britain has been arrested in connection with an alleged cyber attack on the United States Department of Defence (DoD) as part ...

Is It Time for That Spring Cleaning?

Graham Welch | Posted 25.02.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

Data, data, everywhere...

Graham Welch | Posted 13.04.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

The Worst Password List Is Here

The Huffington Post UK | Thomas Tamblyn | Posted 21.01.2015 | UK Tech

How secure is your password? The likelihood is that at the very least, it could probably do with a few symbols. At the very worst, you could find your...

2015 Technology Predictions - What Does the Future Hold?

Gary Newe | Posted 03.03.2015 | UK Tech
Gary Newe

The past year has seen the world's digital transformation take another significant step forwards. Cyber security, wearable technology, the Internet of Things (IoT), big data and the continuous expansion of the cloud, are all changing the way we interact with technology. But what does the future hold?

Sony-Style Hacks Could Be 'New Normal' In 2015

Huffington Post UK/PA | Posted 18.12.2014 | UK Tech

The Sony Pictures hack has been unprecedented in its scale and impact. Welcome to the new normal. Experts have said that massive cyber attacks c...

Prepare for the Festive IT Headache

Graham Welch | Posted 06.02.2015 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 02.02.2015 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

Staying Safe on Cyber Monday

David Emm | Posted 28.01.2015 | UK Tech
David Emm

Cyber Monday, which this year falls on 1 December, is one of the busiest online shopping days of the year - for consumers and fraudsters alike. With more and more of us living connected lives, less people are shopping on the high street.

Spycam Hacking Shock

Graham Welch | Posted 21.01.2015 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

A Generation of Coders? Cyber-Skilling Takes Centre Stage

Peter Armstrong | Posted 03.12.2014 | UK Universities & Education
Peter Armstrong

This September kids up and down the country returned to school to find that alongside the traditional subjects of Maths, English and Science, three new areas of study in computer science, digital skills and IT had been introduced to the national curriculum.

GCHQ Just Launched A Video Game To Try And Save The World

The Huffington Post UK | Posted 21.08.2014 | UK Tech

British cyber spooks have created a new online game to find new recruits - and test the public's ability to deal with hacking attacks. Intelligence...

Here's How You Break Into A Car Using Just Your Laptop

The Huffington Post UK | Thomas Tamblyn | Posted 07.08.2014 | UK Tech

A video has been uploaded showing a man breaking into his own car using nothing but a laptop. Security researcher Dr Silvio Cesare exclusively reve...

A Russian Gang Just Stole Over A Billion Passwords

The Huffington Post UK | Thomas Tamblyn | Posted 06.08.2014 | UK Tech

A Russian criminal gang has successfuly carried out the world's largest data breach amassing over a billion usernames and passwords as well as over 50...

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Google Glass Can Recognise Your Pin

The Huffington Post UK | Thomas Tamblyn | Posted 25.06.2014 | UK Tech

A person wearing Google Glass can now use a piece of software to recognise your pin from over 10m just by using the camera. Developed by the Cyber ...

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.