Cyber Security

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Removing Compliance Barriers To Social Media

Mark Gossington | Posted 05.12.2016 | UK Tech
Mark Gossington

Financial services companies cannot afford to overlook social media because it is challenging. Customers are on social media. They want - and will - use social media to communicate, and therefore companies must be prepared to communicate on these channels too.

Cloudy With A Chance Of Leak-Balls: Should We Up Our Cyber-Security After #Election2016?

Sam Lewis-Hargreave | Posted 28.11.2016 | UK Tech
Sam Lewis-Hargreave

There are several reasons this happened, but one has haunted me most: Hillary Clinton's leaked emails. Since the "scandal" broke, I've become terrified of hacking. This isn't because I may run for President myself (#SLH2020), but because the vulnerability of the Clinton campaign's email accounts bodes badly for the rest of us.

Careful Surfing Required In The Digital Age

Alastair Paterson | Posted 23.11.2016 | UK Tech
Alastair Paterson

The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.

Creating An Effective Cyber Security Response Plan

John Worrall | Posted 23.11.2016 | UK Tech
John Worrall

Organisations plan for success. They should also plan for worst case scenarios - especially in the case of a cyber attack or breach. For many organisations, preparedness means developing plans for disaster recovery and continuity of operations.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

UK Government Gets Serious About Cybercrime

Alastair Paterson | Posted 07.11.2016 | UK Tech
Alastair Paterson

Clearly cyber attackers have their sights firmly set on everything we do online these days and that requires us, as citizens, business people and government representatives to take a different view of cybersecurity.

Government Must Think Beyond 2020 And Tackle Skills Gap To Ensure UK Cyber Safety

Gad Elkin | Posted 07.11.2016 | UK Tech
Gad Elkin

Although the Government has yet to disclose where much of the £1.9bn will be invested, too few of the details that were announced suggested the Government has this longer term, education-focussed, thinking in mind

Will The Lack Of Skills Hamper The Government Ambition For Increased Cyber Security?

Anthony Sherick | Posted 03.11.2016 | UK Tech
Anthony Sherick

To build a booming market for talent, this should include subsidised training for individuals and corporates, apprenticeships and particularly a strong effort or financial incentives to grow the take up and offerings of Cyber Security degrees. Promotion and awareness of the industry and the opportunities available needs to be wide reaching.

Who's Hiding Behind The App?

David Emm | Posted 31.10.2016 | UK Tech
David Emm

However, our constantly connected culture brings great risks, such as identity fraud, harassment and theft. Beyond a handful of pictures, emojis and light-hearted messages, we have very little knowledge of a person's true intentions or motives when they are positioned behind a social media account or dating profile.

The Internet Of Things And DDoS - The Joke Is On Us

Vince Warrington | Posted 27.10.2016 | UK Tech
Vince Warrington

The size of attacks has increased exponentially, thanks to the cyber criminals making use of the IoT. These devices are typically designed to be quick and cheap to produce, and have very poor levels of security. Essentially stripped-down versions of your home computer

In The Online War On Terror, How Do We Protect Digital Freedoms?

Philip Ellis | Posted 24.10.2016 | UK Tech
Philip Ellis

In a bid to stem the tide of digital radicalisation by terrorist groups such as Islamic State, the European Parliament has approved plans for new legislation which will allow rapid and widespread removal of extremist content from the internet. Digital rights activists are up in arms over the decision, which they fear will lead to private organisations policing and censoring internet users with impunity.

The Cost Of Data Breaches Will Get Even Higher

Alastair Paterson | Posted 24.10.2016 | UK Tech
Alastair Paterson

Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.

Worried About Cyberattacks? Make Sure You Are Not Using Unlicensed Software

Sarah Coombes | Posted 21.10.2016 | UK Tech
Sarah Coombes

While traditional security measures such as firewalls, access logs, zoned areas and good security architecture all contribute to good cyber security practice, there may be another, often overlooked, danger lurking within your network: unlicensed software.

Biometrics - Gambling With Identity?

Andre Malinowski | Posted 20.10.2016 | UK Tech
Andre Malinowski

The trouble for me is that, with identity, there's no margin for error. A password can be easily changed, but a face, fingerprint or voice isn't so easy. This technology needs to be completely secure and tested before it is rolled out as a primary or sole method of identification for banking.

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

How Safe Is It To Connect To Public Wi-Fi Networks?

Nicholas Shaw | Posted 14.10.2016 | UK Tech
Nicholas Shaw

It goes without saying that a great deal of this convenience also stems from the sheer number free Wi-Fi hotspots which we love to connect to, largely because they are really convenient and help us avoid hefty data charges.

Welcome To The Hotel Malware

Alastair Paterson | Posted 24.08.2016 | UK Tech
Alastair Paterson

Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.

The Rise In Ransomware: How To Keep Your Data Out Of The Wrong Hands

Gad Elkin | Posted 23.08.2016 | UK Tech
Gad Elkin

Whilst attacks have increased in intensity, hacker groups have also chosen to flex their digital muscles by launching attacks to a very specific intensity, demonstrating their capabilities to victims.

Build or Buy: Securing IoT Is Harder Than It Looks for Device Manufacturers

Dominique Guinard | Posted 08.08.2016 | UK Tech
Dominique Guinard

In Mr Robot, Elliott Alderson explicitly exploits 'easy' vulnerabilities: obvious passwords, open back doors, etc. As the world inevitably becomes more connected, risks will accompany benefits; the starting point for security must always be best-practice encryption and protocols. Just as in the 'real' world, there will be break-ins - but they become much less likely if you lock all your doors and windows.

The US Air Force's Terrifying New Cyber Weapon Is Basically 'Skynet'

The Huffington Post UK | Thomas Tamblyn | Posted 08.03.2016 | UK Tech

The US Air Force has a terrifying new weapon against the increasing threat of cyber attacks and at first glance it bears a striking resemblance to 'Sk...

Fighting Crime Online: How Law Enforcement Agencies Are Working to Keep Citizens Safe

Russell Haworth | Posted 24.02.2016 | UK Tech
Russell Haworth

Tackling the broader cybercrime challenge needs an orchestrated response. I wanted to highlight three ways in which law enforcement agencies are working with each other and other organisations (including my own) to tackle the real and very present danger represented by opportunistic and organised criminals online...

Surviving in the Connected Home

David Emm | Posted 30.11.2016 | UK Tech
David Emm

Our homes are filled with an ever growing number of connected devices, but just how safe are our coffeemakers, smart meters or baby monitors from cyber-intruders?

Don't Hound the Hackers - Question Our Inability to Engage Them

Gi Fernando | Posted 29.10.2016 | UK Tech
Gi Fernando

Young people like Aaron Sterrit are capable of breaking down security walls, but they are also capable of making them stronger. The proverbial bike thief employed by the police to help identify top spots for bike theft has become the young digital pro who can spot the cracks in a firewall.