Cyber Security

Data Protection - It Isn't Just For Businesses

Stuart Facey | Posted 20.09.2017 | UK Tech
Stuart Facey

Data. We send and receive so much of it on a daily basis that we almost don't think about it anymore. As long as it reaches its destination, we don't think about what happens to it in-between, or even consider who may have access to it.

Cybercriminals Are Using Big Name Apps To Target Unwitting Consumers

David Emm | Posted 18.09.2017 | UK Tech
David Emm

Cybercriminals are constantly looking for new ways to lure us into doing things that give them access to our online identity. The past month has been no different, with crooks targeting two popular applications in an attempt to target personal details: Facebook and Uber. While they are among the most trusted applications we use, when using them we need to be as vigilant as ever to the threat from potential scams.

Knock Knock. Who's There?

Jenny Afia | Posted 14.09.2017 | UK Tech
Jenny Afia

You get home after a great night out. You're thinking you'll be a bit tired for tomorrow morning's meeting but it was worth it to see your friends. You're just about to put your keys into the lock, when the door opens. The lock's broken. You move from mellow to misery, via terror, in about half a second. You've been burgled, done over, invaded. Your deadlock's deadbeat.

Why We All Need To Worry About The Dark Web

Javvad Malik | Posted 06.09.2017 | UK Tech
Javvad Malik

Tor was originally set up in the mid-1990s and offers anonymous browsing to people across the world. It now hosts roughly 30,000 hidden sites. Users in countries with strict censorship laws can use it to access mainstream sites and exchange information securely.

Cyber Security Demands There Must Be No Glass Ceiling For Innovation And Training

Greg Sim | Posted 25.08.2017 | UK Tech
Greg Sim

Some 54 per cent of boards view cyber risk as a primary threat to their business, which was up from 49 per cent last year. But on the other hand it was found that 69 per cent do not receive comprehensive information on that risk.

Brexit = No Exit From GDPR

Oliver Pinson-Roxburgh | Posted 21.08.2017 | UK Tech
Oliver Pinson-Roxburgh

The list of things that will change when Brexit comes into effect is almost immeasurable. What will remain the same, however, is the impact of the General Data Protection Regulation (GDPR) ruling on data regulations in the UK. Despite Brexit, GDPR will still have a seismic impact on businesses who use and store EU data.

How Much Would Your Spotify Account Be Worth?

Nicholas Shaw | Posted 27.07.2017 | UK Tech
Nicholas Shaw

You can buy pretty much anything on the internet. You just need to know where to look. For most of us, the only times we'd venture off the beaten track would be to find a specialist birthday gift perhaps, or a niche item you spotted on Pinterest, Facebook or Reddit. But what might surprise you is that in some places, your digital belongings could also be listed for sale - all at rock bottom prices.

Are Cyber Thieves And Snoopers Turning Your Smart Home Against You?

Peter Turner | Posted 14.07.2017 | UK Tech
Peter Turner

As our homes become jam-packed with smarter devices in the years to come, they may help to makes our lives easier. At the same time, if they are not secured, they also can make the lives of cyber criminals easier by giving access to our whole network and all the devices on it. To be truly safe in our smart homes then we need to start applying the same security principles we already do with our mobile phones and computers.

How AI Might Transform The Landscape Of Cybersecurity

Waqas Khan | Posted 22.06.2017 | UK Tech
Waqas Khan

While cybercriminals quickly learn to use emerging technologies for their own benefit, it's the most ripe time to delve into the thought process on how artificial intelligence will fit into cyber security infrastructure of businesses and with AI still in the early stages, it's time to work on strategies to utilise it fully once it marks its second coming in the business world.

Cyber Security Innovation Is Vital To The Protection Of Shareholder Confidence

Greg Sim | Posted 20.06.2017 | UK Tech
Greg Sim

The post mortems about the widespread WannaCry ransomware attack in May have tended to overlook the most common consequences of cyber-attacks - the da...

Top Three Trends Of Cyber Security In 2017

Sheheryar Ahmed Khan | Posted 09.06.2017 | UK Tech
Sheheryar Ahmed Khan

2016 was an interesting year, to say the least, when it comes to cyber security. Cyber-attacks set a record in 2016, with big names like Yahoo! LinkedIn, Tumblr, Ashley Madison, and Tesco all being successfully infiltrated. And according to most cyber security experts, cyber-attacks will get more dangerous and frequent in 2017.

The Only Way To Shut Out Ransomware Like WannaCry And Its Nasty Imitators

Greg Sim | Posted 31.05.2017 | UK Tech
Greg Sim

No matter who is responsible, what might reduce WannaCry's victims to tears is the knowledge that none of this would have happened had their organisations had effective email security in place. The hackers who perpetrated this massive cyber-attack will almost certainly have used a simple email attachment to gain admission to their victims' respective systems.

'Why All The Questions? I'm Already A Loyal Customer'

John Abbott | Posted 31.05.2017 | UK Tech
John Abbott

How many bags would you like? Do you have a loyalty card? Can you scan it? What payment method do you want to pay with? Are you over 18 or do you look under 25? Wow. And I only popped in for a packet of crisps and a newspaper for my train home... OK, and a bottle of red to go with dinner.

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

A Ransom Note From Your Coffee-Machine Is No Joke, But It's Not The Only Threat

Greg Sim | Posted 06.04.2017 | UK Tech
Greg Sim

Why have gadgets and devices suddenly become linked to cyber security and ransomware? Cyber criminals are not stupid - they are after your money, not the glory of hacking into your internet-connected coffee-maker or heating system.

The Next Generation Cyber Technologies Being Used To Defend Businesses

Bryan Lillie | Posted 31.03.2017 | UK Tech
Bryan Lillie

The upcoming CyberUK should act as the starting point for this, bringing all aspects of industry, tech developers, cyber experts and OEM's together under the umbrella of the new strategy, ensuring the UK creates a safe cyberspace for everyone.

Cyber Defenders Of The Future Must Be Given The Opportunity To Put Theory Into Practice

Dr Frank Stajano | Posted 27.03.2017 | UK Tech
Dr Frank Stajano

Cyber security competitions give pupils the opportunity to implement the skills and theory they have been taught at university in a realistic environment, while learning new ones in the process, which will help grow them in to the cyber defenders of the future.

Seven Security Tips That Will Make Your Digital Life Infinitely Better

Jyoti Agrawal | Posted 27.03.2017 | UK Tech
Jyoti Agrawal

One of the worst things that can happen is to have your credit card number stolen and be thousands of dollars in debt for purchases you didn't make. A more common scenario, however, is to get infected by malware that only compromises the performance of your device or the quality of your online browsing experience.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

The Evolution Of Cyberspace

Bryan Lillie | Posted 17.03.2017 | UK Tech
Bryan Lillie

When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry. The iPhone had only just launched; Facebook was still in it's infancy; the Internet of Things (IoT) was still a dream.

Just How Safe Are Our Mobile Apps?

Alastair Paterson | Posted 16.03.2017 | UK Tech
Alastair Paterson

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

Real CEO, Fake CEO: Who Is The Biggest Enterprise Threat?

Mike Foreman | Posted 06.03.2017 | UK Tech
Mike Foreman

With so much at stake and so much already invested in security systems to then allow cybercriminals a way into the organization that's completely beyond the IT department's control is the business equivalent of shooting yourself in the foot.

How Safe Is Your Child Online?

Estelle Lloyd | Posted 06.03.2017 | UK Parents
Estelle Lloyd

So I ask you, how is riding a bike any different from using the internet? We need to nurture our children, explain right from wrong, make them aware of the dangers lurking around every corner and to always think

How To Create A Cyber Security Playbook

Paul Rose | Posted 22.02.2017 | UK Tech
Paul Rose

All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.

Terrorism And Critical Infrastructure

Dr Ion Jinga | Posted 16.02.2017 | UK
Dr Ion Jinga

Protection of Critical Infrastructure has become a priority issue for states, in reaction to the growing risks posed by terrorism. All governments rec...