Cyber Security

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

A Ransom Note From Your Coffee-Machine Is No Joke, But It's Not The Only Threat

Greg Sim | Posted 06.04.2017 | UK Tech
Greg Sim

Why have gadgets and devices suddenly become linked to cyber security and ransomware? Cyber criminals are not stupid - they are after your money, not the glory of hacking into your internet-connected coffee-maker or heating system.

The Next Generation Cyber Technologies Being Used To Defend Businesses

Bryan Lillie | Posted 31.03.2017 | UK Tech
Bryan Lillie

The upcoming CyberUK should act as the starting point for this, bringing all aspects of industry, tech developers, cyber experts and OEM's together under the umbrella of the new strategy, ensuring the UK creates a safe cyberspace for everyone.

Cyber Defenders Of The Future Must Be Given The Opportunity To Put Theory Into Practice

Dr Frank Stajano | Posted 27.03.2017 | UK Tech
Dr Frank Stajano

Cyber security competitions give pupils the opportunity to implement the skills and theory they have been taught at university in a realistic environment, while learning new ones in the process, which will help grow them in to the cyber defenders of the future.

Seven Security Tips That Will Make Your Digital Life Infinitely Better

Jyoti Agrawal | Posted 27.03.2017 | UK Tech
Jyoti Agrawal

One of the worst things that can happen is to have your credit card number stolen and be thousands of dollars in debt for purchases you didn't make. A more common scenario, however, is to get infected by malware that only compromises the performance of your device or the quality of your online browsing experience.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

The Evolution Of Cyberspace

Bryan Lillie | Posted 17.03.2017 | UK Tech
Bryan Lillie

When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry. The iPhone had only just launched; Facebook was still in it's infancy; the Internet of Things (IoT) was still a dream.

Just How Safe Are Our Mobile Apps?

Alastair Paterson | Posted 16.03.2017 | UK Tech
Alastair Paterson

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

Real CEO, Fake CEO: Who Is The Biggest Enterprise Threat?

Mike Foreman | Posted 06.03.2017 | UK Tech
Mike Foreman

With so much at stake and so much already invested in security systems to then allow cybercriminals a way into the organization that's completely beyond the IT department's control is the business equivalent of shooting yourself in the foot.

How Safe Is Your Child Online?

Estelle Lloyd | Posted 06.03.2017 | UK Parents
Estelle Lloyd

So I ask you, how is riding a bike any different from using the internet? We need to nurture our children, explain right from wrong, make them aware of the dangers lurking around every corner and to always think

How To Create A Cyber Security Playbook

Paul Rose | Posted 22.02.2017 | UK Tech
Paul Rose

All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.

Terrorism And Critical Infrastructure

Dr Ion Jinga | Posted 16.02.2017 | UK
Dr Ion Jinga

Protection of Critical Infrastructure has become a priority issue for states, in reaction to the growing risks posed by terrorism. All governments rec...

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

The Headlong IoT Gold Rush Is Undermining Security And Making Our Smart Homes Dumb

Yossi Atias | Posted 14.02.2017 | UK Tech
Yossi Atias

But smart devices are also dumb. They can't fend off cyber-attacks, they won't alert us if somebody is probing our device from the Internet, and they won't raise a red flag if suspicious activity is detected on our network.

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

2017 - The Year We All Need To Become Cyber Smart

Vince Warrington | Posted 12.01.2017 | UK Tech
Vince Warrington

Businesses - as well as the general public - will consequently have to get smarter and more agile if they don't want to fall victim to an increasingly sophisticated and well-coordinated network of cyber gangs.

Time For Your New Year Cyber Detox?

Alastair Paterson | Posted 10.01.2017 | UK Tech
Alastair Paterson

If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.

A Connected World: It's Time We Put A Stop To Cybercrime

Adrian Adair | Posted 22.12.2016 | UK Tech
Adrian Adair

Over the past decade, our habits as consumers have radically evolved, from online banking and shopping to how we communicate with our family members - remember fax machines for communication in the workplace and the introduction of the first mobile phone?

Why Phishing Is Only The Beginning Of A Cyber Attack

John Worrall | Posted 19.12.2016 | UK Tech
John Worrall

Of course it is always better to keep an attacker outside of your network if you can. But, recognising the difficulty of that, many companies today operate as if a breach has already (or will) occurred.

The Everyday Dangers Of The Internet

Daniel Woods | Posted 14.12.2016 | UK Universities & Education
Daniel Woods

The Dark Web, the Deep Web, the Dark Internet. Take a much used and little understood technology, add a threatening adjective and you get hype and fearmongering. Are there real threats to your privacy? Yes. Is there something you can do about it? Absolutely.

MELT Away Scams This Winter

Javvad Malik | Posted 09.12.2016 | UK Tech
Javvad Malik

Scams can vary greatly in their nature and execution methods, but the majority of them work by emotionally manipulating their victims' behaviour through greed, desire or fear. For this reason, keeping in mind a simple acronym, MELT - which stands for Money, Employment, Love and Threats -

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Removing Compliance Barriers To Social Media

Mark Gossington | Posted 05.12.2016 | UK Tech
Mark Gossington

Financial services companies cannot afford to overlook social media because it is challenging. Customers are on social media. They want - and will - use social media to communicate, and therefore companies must be prepared to communicate on these channels too.