Cyberattacks

'Alexa, Should The Public Trust Virtual Assistants In The Connected Home?'

Colin Bull | Posted 27.07.2017 | UK Tech
Colin Bull

To be in with a chance to 'own the home' providers must ensure that quality underpins not only the devices themselves - from conception right through to when the product enters our home - but also customer interactions, our personal data and ultimately our safety. Let the race begin.

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

Just How Safe Are Our Mobile Apps?

Alastair Paterson | Posted 16.03.2017 | UK Tech
Alastair Paterson

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Time For Your New Year Cyber Detox?

Alastair Paterson | Posted 10.01.2017 | UK Tech
Alastair Paterson

If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Careful Surfing Required In The Digital Age

Alastair Paterson | Posted 23.11.2016 | UK Tech
Alastair Paterson

The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.

UK Government Gets Serious About Cybercrime

Alastair Paterson | Posted 07.11.2016 | UK Tech
Alastair Paterson

Clearly cyber attackers have their sights firmly set on everything we do online these days and that requires us, as citizens, business people and government representatives to take a different view of cybersecurity.

The Cost Of Data Breaches Will Get Even Higher

Alastair Paterson | Posted 24.10.2016 | UK Tech
Alastair Paterson

Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.

Welcome To The Hotel Malware

Alastair Paterson | Posted 24.08.2016 | UK Tech
Alastair Paterson

Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.

Attracting Young People to Tech

Graham Welch | Posted 16.09.2016 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

Beware the All-Knowing App

Graham Welch | Posted 08.07.2016 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 18.06.2016 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

What Happens After a Cyberattack?

Graham Welch | Posted 19.05.2016 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

Mind the Cyber Gap

Graham Welch | Posted 28.06.2015 | UK Tech
Graham Welch

In the bygone, romantic age of steam mechanical failure, a stray farm animal on the line or severe weather would have been enough to bring a train to a halt, but today there is much greater threat to the modern railway - cyber crime.

Criminals Shopping for Your Data

Graham Welch | Posted 30.05.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

People Remain the Weakest Link in Security

Graham Welch | Posted 05.05.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

Is It Time for That Spring Cleaning?

Graham Welch | Posted 26.04.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

Data, data, everywhere...

Graham Welch | Posted 13.04.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 02.02.2015 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

Children, Computing and the Curriculum

David Emm | Posted 12.11.2014 | UK Tech
David Emm

Online safety is a vital factor at every stage of our children's education. Children use the Internet differently at different ages. Just as the way maths is taught varies from key stage 1 to key stage 4, cyber-security must be approached in a way that will be most meaningful to the life of children at different ages.