Cybersecurity

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 02.09.2015 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 28.08.2015 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Tech Innovation With Security at Heart

Graham Welch | Posted 25.08.2015 | UK Tech
Graham Welch

Cybercrime is unfortunately pervasive at all levels. The only way to counterattack it is to bring security to its rightful place at the heart of every technology - as a vital piece, not an afterthought.

Keep Up or Get Caught Out - Lessons From the Ashley Madison Hack

Gary Newe | Posted 24.07.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

Apple Pay and the Concentration of Data Power

Mike Weston | Posted 17.07.2015 | UK Tech
Mike Weston

It will be another landmark in the concentration of personal data in the hands of a major tech company. Like Google and Facebook, Apple knows a lot about how people lead their lives. In our new digital world, such knowledge is power - and, increasingly, money.

Mozilla Bans Flash From Firefox As It Has A Massive Security Flaw

The Huffington Post UK | Thomas Tamblyn | Posted 15.07.2015 | UK Tech

Mozilla has blocked Adobe's Flash video software from its Firefox browser until further notice after it was revealed that Flash currently has a range ...

Beware the All-Knowing App

Graham Welch | Posted 10.07.2015 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

IBM Continuing to Serve Up the Ultimate Fan and Player Experience

Sam Seddon | Posted 03.07.2015 | UK Tech
Sam Seddon

The amazing thing about Wimbledon is that for 50 weeks of the year it is a private tennis club which evolves for two weeks of the year into a world-class global sporting event delivering fans one of the best, immersive digital experiences here in the UK and beyond - all efficiently enabled by using cloud technology.

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 19.06.2015 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Catching the Big Phish: What Are the Security Risks Facing Financial Organisations?

David Emm | Posted 18.06.2015 | UK Tech
David Emm

With this week being London Technology Week, it seems an appropriate time to raise awareness of these threats so that everyone can use technology with a much lower risk of becoming a victim of cybercrime.

Trouble Communicating With Your Security Team?

Gary Newe | Posted 12.06.2015 | UK Tech
Gary Newe

One piece of advice is putting yourself in the security expert's shoes. By getting to know them and understanding whether their number one focus is on the network, applications, data or infrastructure, you'll be equipped to kick off the conversation in a way which will engage them effectively.

Logging Into Your Email Using Just Your Brainwaves Is Now Possible, Apparently

The Huffington Post UK | Nitya Rajan | Posted 03.06.2015 | UK Tech

Passwords have become a common cause of woe in our hyper connected world of multiple accounts and devices, partly because of our inability to remember...

What Happens After a Cyberattack?

Graham Welch | Posted 21.05.2015 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

The Global Fight Against Cybercrime

David Emm | Posted 29.06.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Billionaires, Icons and Movie Stars - Why Geek Is Now Chic

Gary Newe | Posted 16.06.2015 | UK Tech
Gary Newe

Over the past few years we've seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They're the billionaires, the modern day rock stars, and their many achievements have resulted in a significant change to their status in popular society.

Who is Responsible for Protecting Your Personal Data Online?

Catalin Cosoi | Posted 14.06.2015 | UK Tech
Catalin Cosoi

An overwhelming majority of British adults are now concerned about the online security of their private information, the threats posed by hackers and the possibility of unauthorised access to their data. This was the key finding of recent YouGov research in the wake of the Edward Snowden leaks.

Who's Lurking in Your Mobile?

David Emm | Posted 01.06.2015 | UK Tech
David Emm

Technology is taking over every aspect of our daily lives, and as it does so we become exposed to the associated dangers. One of the biggest threats is the device we carry with us 24/7 - our smartphone.

Criminals Shopping for Your Data

Graham Welch | Posted 30.05.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

"Reports of Bitcoin's Death Have Been Greatly Exaggerated" (With Apologies to Mark Twain)

Peter Greenhill | Posted 31.05.2015 | UK Tech
Peter Greenhill

A massive Bitcoin price drop since the dizzy heights it enjoyed a year ago, UK clearing banks refusing to open accounts for companies in the sector (even those merely supplying software or services to the sector) and the hacking Europe's largest Digital Currency Exchange, Bitstamp, have all been widely reported and referred to by the naysayers.

Five Simple Steps for Smartphone Security

Simon Specka | Posted 30.05.2015 | UK Tech
Simon Specka

Smartphones also face threats from hackers and thieves, while malware such as ad libraries have become a growing problem in app stores. To make sure you're not on the receiving end of a hacking scheme, here are a few simple steps for keeping your smartphone secure.

Ransom Crypto Locker: Your Personal Files Are Encrypted - Be Aware

Shirley Palmer | Posted 25.05.2015 | UK Tech
Shirley Palmer

These people are sophisticated in their approach with details, links, info etc. and you simply have to follow their guidelines. It was with baited breath that I decided the only way forward was to pay them - much to my disgust. Within ten minutes of them receiving the payment I received the key to decrypt my files.

10 Steps to Mitigate a DDoS Attack in Real Time

Gary Newe | Posted 20.05.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

A Month in the Life of the Fight Against Cybercrime

David Emm | Posted 09.05.2015 | UK Tech
David Emm

Once inside the system, hackers are able to move around the system until they find their points of interest - staff and processes that allow them to extract money from the infected system. The worrying thing is that this attack is still active.

People Remain the Weakest Link in Security

Graham Welch | Posted 05.05.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

Is It Time for That Spring Cleaning?

Graham Welch | Posted 26.04.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.