Boards Must Act on Cyber Security - or Heads Will Roll

Dr. Mike Lynch | Posted 25.11.2015 | UK Tech
Dr. Mike Lynch

If you are currently sitting in your office reviewing risk for 2016 and thinking that the biggest cyber threat is a 15-year-old leaking customer credi...

Cyberbullying: A Parent's Guide to Prevention

Vicki Marinker | Posted 19.11.2015 | UK Tech
Vicki Marinker

This week is Anti-Bullying Week so I've been hunting around on the internet (safely obvs) to find the best advice about how to prevent, and deal with bullying - particularly cyberbullying.

Why Business Must Understand the Threat of the Internet of Things

Nigel Somerville MBE | Posted 18.11.2015 | UK Tech
Nigel Somerville MBE

The potential of the Internet of Things (IoT) is jaw dropping. Its value to industry could be worth $11.1trillion a year globally and it will revoluti...

Surveillance Bill: A Cyber Security Expert's View

George Dokimakis | Posted 06.11.2015 | UK Tech
George Dokimakis

If the government really wanted to make a difference, it would properly penalise companies that underinvest in security and lose people's information with little to no impact. It would not ask them to increase the data they are holding about individuals. Holding more data about individuals will make subsequent data losses catastrophic to their everyday lives.

McFly and Doc Never Saw Cybercrime Coming

Graham Welch | Posted 21.10.2015 | UK Tech
Graham Welch

If we want to keep on the path of creating technology seen in sci-fi films, and not horror ones, we all need to bring our concepts of cybersecurity to the 21st century.

Cyber Bullying Is NO Kids' Game

Dragana Brown | Posted 21.10.2015 | UK Tech
Dragana Brown

We live in a society exquisitely dependent on technology. Our world's very different to how it was not that long ago with the internet such a big player.

Hansel, Gretel and the Digital Babysitter

Nicholas Shaw | Posted 14.10.2015 | UK Tech
Nicholas Shaw

Children are so intuitive with technology and it's amazing how quickly they learn to use a device, even at an extremely young age. While this is great for keeping them entertained and teaching new skills through educational games, it can be a matter of seconds before they have clicked on the wrong link and are suddenly exposed to content that is not age appropriate.

The Three Little Pigs and Their Mobile Devices

Nicholas Shaw | Posted 08.10.2015 | UK Parents
Nicholas Shaw

Once upon a time, there lived three little pigs. As the little pigs grew older they each decided to build a home for themselves, and when they left home they were given a smartphone and tablet each.

Snow White and the Strong Password

Nicholas Shaw | Posted 29.09.2015 | UK Parents
Nicholas Shaw

Just as the seven dwarves keep Snow White safe from her wicked stepmother, it's important to teach children how to protect personal information online, by making sure their passwords are strong and private.

Top Tips for Protecting Yourself Online

Nicholas Shaw | Posted 21.09.2015 | UK Tech
Nicholas Shaw

High profile hacks such as that of online dating website, Ashley Madison, and last year's attack on Sony have helped bring hacking scandals to the forefront of the news agenda, what these high profile, large scale business hacks fail to bring to light is the smaller scale cyber-attacks targeting consumers, like you and I daily, and the impact these can have on our lives.

Attracting Young People to Tech

Graham Welch | Posted 21.09.2015 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

Protecting Brand Me

Nicholas Shaw | Posted 15.09.2015 | UK Tech
Nicholas Shaw

Social media has revolutionised the way we communicate, engage and perceive the people around us. In an age where statuses, 'likes' and photo uploads document our every move, our identities and reputation are firmly shaped by our social presence.

How to Help Your Children Stay Safe Online

Nicholas Shaw | Posted 09.09.2015 | UK Parents
Nicholas Shaw

The internet is an amazing resource for children, but it can represent a worrying unknown for parents. We worry about what or whom our children may encounter online, and how we can protect them.

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 02.09.2015 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 28.08.2015 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Tech Innovation With Security at Heart

Graham Welch | Posted 25.08.2015 | UK Tech
Graham Welch

Cybercrime is unfortunately pervasive at all levels. The only way to counterattack it is to bring security to its rightful place at the heart of every technology - as a vital piece, not an afterthought.

Keep Up or Get Caught Out - Lessons From the Ashley Madison Hack

Gary Newe | Posted 24.07.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

Apple Pay and the Concentration of Data Power

Mike Weston | Posted 17.07.2015 | UK Tech
Mike Weston

It will be another landmark in the concentration of personal data in the hands of a major tech company. Like Google and Facebook, Apple knows a lot about how people lead their lives. In our new digital world, such knowledge is power - and, increasingly, money.

Mozilla Bans Flash From Firefox As It Has A Massive Security Flaw

The Huffington Post UK | Thomas Tamblyn | Posted 15.07.2015 | UK Tech

Mozilla has blocked Adobe's Flash video software from its Firefox browser until further notice after it was revealed that Flash currently has a range ...

Beware the All-Knowing App

Graham Welch | Posted 10.07.2015 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

IBM Continuing to Serve Up the Ultimate Fan and Player Experience

Sam Seddon | Posted 03.07.2015 | UK Tech
Sam Seddon

The amazing thing about Wimbledon is that for 50 weeks of the year it is a private tennis club which evolves for two weeks of the year into a world-class global sporting event delivering fans one of the best, immersive digital experiences here in the UK and beyond - all efficiently enabled by using cloud technology.

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 19.06.2015 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Catching the Big Phish: What Are the Security Risks Facing Financial Organisations?

David Emm | Posted 18.06.2015 | UK Tech
David Emm

With this week being London Technology Week, it seems an appropriate time to raise awareness of these threats so that everyone can use technology with a much lower risk of becoming a victim of cybercrime.

Trouble Communicating With Your Security Team?

Gary Newe | Posted 12.06.2015 | UK Tech
Gary Newe

One piece of advice is putting yourself in the security expert's shoes. By getting to know them and understanding whether their number one focus is on the network, applications, data or infrastructure, you'll be equipped to kick off the conversation in a way which will engage them effectively.

Logging Into Your Email Using Just Your Brainwaves Is Now Possible, Apparently

The Huffington Post UK | Nitya Rajan | Posted 03.06.2015 | UK Tech

Passwords have become a common cause of woe in our hyper connected world of multiple accounts and devices, partly because of our inability to remember...