Cyber Security

How To Create A Cyber Security Playbook

Paul Rose | Posted 22.02.2017 | UK Tech
Paul Rose

All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.

Terrorism And Critical Infrastructure

Dr Ion Jinga | Posted 16.02.2017 | UK
Dr Ion Jinga

Protection of Critical Infrastructure has become a priority issue for states, in reaction to the growing risks posed by terrorism. All governments rec...

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

The Headlong IoT Gold Rush Is Undermining Security And Making Our Smart Homes Dumb

Yossi Atias | Posted 14.02.2017 | UK Tech
Yossi Atias

But smart devices are also dumb. They can't fend off cyber-attacks, they won't alert us if somebody is probing our device from the Internet, and they won't raise a red flag if suspicious activity is detected on our network.

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

2017 - The Year We All Need To Become Cyber Smart

Vince Warrington | Posted 12.01.2017 | UK Tech
Vince Warrington

Businesses - as well as the general public - will consequently have to get smarter and more agile if they don't want to fall victim to an increasingly sophisticated and well-coordinated network of cyber gangs.

Time For Your New Year Cyber Detox?

Alastair Paterson | Posted 10.01.2017 | UK Tech
Alastair Paterson

If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.

A Connected World: It's Time We Put A Stop To Cybercrime

Adrian Adair | Posted 22.12.2016 | UK Tech
Adrian Adair

Over the past decade, our habits as consumers have radically evolved, from online banking and shopping to how we communicate with our family members - remember fax machines for communication in the workplace and the introduction of the first mobile phone?

Why Phishing Is Only The Beginning Of A Cyber Attack

John Worrall | Posted 19.12.2016 | UK Tech
John Worrall

Of course it is always better to keep an attacker outside of your network if you can. But, recognising the difficulty of that, many companies today operate as if a breach has already (or will) occurred.

The Everyday Dangers Of The Internet

Daniel Woods | Posted 14.12.2016 | UK Universities & Education
Daniel Woods

The Dark Web, the Deep Web, the Dark Internet. Take a much used and little understood technology, add a threatening adjective and you get hype and fearmongering. Are there real threats to your privacy? Yes. Is there something you can do about it? Absolutely.

MELT Away Scams This Winter

Javvad Malik | Posted 09.12.2016 | UK Tech
Javvad Malik

Scams can vary greatly in their nature and execution methods, but the majority of them work by emotionally manipulating their victims' behaviour through greed, desire or fear. For this reason, keeping in mind a simple acronym, MELT - which stands for Money, Employment, Love and Threats -

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Removing Compliance Barriers To Social Media

Mark Gossington | Posted 05.12.2016 | UK Tech
Mark Gossington

Financial services companies cannot afford to overlook social media because it is challenging. Customers are on social media. They want - and will - use social media to communicate, and therefore companies must be prepared to communicate on these channels too.

Cloudy With A Chance Of Leak-Balls: Should We Up Our Cyber-Security After #Election2016?

Sam Lewis-Hargreave | Posted 28.11.2016 | UK Tech
Sam Lewis-Hargreave

There are several reasons this happened, but one has haunted me most: Hillary Clinton's leaked emails. Since the "scandal" broke, I've become terrified of hacking. This isn't because I may run for President myself (#SLH2020), but because the vulnerability of the Clinton campaign's email accounts bodes badly for the rest of us.

Careful Surfing Required In The Digital Age

Alastair Paterson | Posted 23.11.2016 | UK Tech
Alastair Paterson

The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.

Creating An Effective Cyber Security Response Plan

John Worrall | Posted 23.11.2016 | UK Tech
John Worrall

Organisations plan for success. They should also plan for worst case scenarios - especially in the case of a cyber attack or breach. For many organisations, preparedness means developing plans for disaster recovery and continuity of operations.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

UK Government Gets Serious About Cybercrime

Alastair Paterson | Posted 07.11.2016 | UK Tech
Alastair Paterson

Clearly cyber attackers have their sights firmly set on everything we do online these days and that requires us, as citizens, business people and government representatives to take a different view of cybersecurity.

Government Must Think Beyond 2020 And Tackle Skills Gap To Ensure UK Cyber Safety

Gad Elkin | Posted 07.11.2016 | UK Tech
Gad Elkin

Although the Government has yet to disclose where much of the £1.9bn will be invested, too few of the details that were announced suggested the Government has this longer term, education-focussed, thinking in mind

Will The Lack Of Skills Hamper The Government Ambition For Increased Cyber Security?

Anthony Sherick | Posted 03.11.2016 | UK Tech
Anthony Sherick

To build a booming market for talent, this should include subsidised training for individuals and corporates, apprenticeships and particularly a strong effort or financial incentives to grow the take up and offerings of Cyber Security degrees. Promotion and awareness of the industry and the opportunities available needs to be wide reaching.

Who's Hiding Behind The App?

David Emm | Posted 31.10.2016 | UK Tech
David Emm

However, our constantly connected culture brings great risks, such as identity fraud, harassment and theft. Beyond a handful of pictures, emojis and light-hearted messages, we have very little knowledge of a person's true intentions or motives when they are positioned behind a social media account or dating profile.

The Internet Of Things And DDoS - The Joke Is On Us

Vince Warrington | Posted 27.10.2016 | UK Tech
Vince Warrington

The size of attacks has increased exponentially, thanks to the cyber criminals making use of the IoT. These devices are typically designed to be quick and cheap to produce, and have very poor levels of security. Essentially stripped-down versions of your home computer

In The Online War On Terror, How Do We Protect Digital Freedoms?

Philip Ellis | Posted 24.10.2016 | UK Tech
Philip Ellis

In a bid to stem the tide of digital radicalisation by terrorist groups such as Islamic State, the European Parliament has approved plans for new legislation which will allow rapid and widespread removal of extremist content from the internet. Digital rights activists are up in arms over the decision, which they fear will lead to private organisations policing and censoring internet users with impunity.