The Three Little Pigs and Their Mobile Devices

Nicholas Shaw | Posted 08.10.2015 | UK Parents
Nicholas Shaw

Once upon a time, there lived three little pigs. As the little pigs grew older they each decided to build a home for themselves, and when they left home they were given a smartphone and tablet each.

Snow White and the Strong Password

Nicholas Shaw | Posted 29.09.2015 | UK Parents
Nicholas Shaw

Just as the seven dwarves keep Snow White safe from her wicked stepmother, it's important to teach children how to protect personal information online, by making sure their passwords are strong and private.

Top Tips for Protecting Yourself Online

Nicholas Shaw | Posted 21.09.2015 | UK Tech
Nicholas Shaw

High profile hacks such as that of online dating website, Ashley Madison, and last year's attack on Sony have helped bring hacking scandals to the forefront of the news agenda, what these high profile, large scale business hacks fail to bring to light is the smaller scale cyber-attacks targeting consumers, like you and I daily, and the impact these can have on our lives.

Attracting Young People to Tech

Graham Welch | Posted 21.09.2015 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

Protecting Brand Me

Nicholas Shaw | Posted 15.09.2015 | UK Tech
Nicholas Shaw

Social media has revolutionised the way we communicate, engage and perceive the people around us. In an age where statuses, 'likes' and photo uploads document our every move, our identities and reputation are firmly shaped by our social presence.

How to Help Your Children Stay Safe Online

Nicholas Shaw | Posted 09.09.2015 | UK Parents
Nicholas Shaw

The internet is an amazing resource for children, but it can represent a worrying unknown for parents. We worry about what or whom our children may encounter online, and how we can protect them.

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 02.09.2015 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 28.08.2015 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Tech Innovation With Security at Heart

Graham Welch | Posted 25.08.2015 | UK Tech
Graham Welch

Cybercrime is unfortunately pervasive at all levels. The only way to counterattack it is to bring security to its rightful place at the heart of every technology - as a vital piece, not an afterthought.

Keep Up or Get Caught Out - Lessons From the Ashley Madison Hack

Gary Newe | Posted 24.07.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

Apple Pay and the Concentration of Data Power

Mike Weston | Posted 17.07.2015 | UK Tech
Mike Weston

It will be another landmark in the concentration of personal data in the hands of a major tech company. Like Google and Facebook, Apple knows a lot about how people lead their lives. In our new digital world, such knowledge is power - and, increasingly, money.

Mozilla Bans Flash From Firefox As It Has A Massive Security Flaw

The Huffington Post UK | Thomas Tamblyn | Posted 15.07.2015 | UK Tech

Mozilla has blocked Adobe's Flash video software from its Firefox browser until further notice after it was revealed that Flash currently has a range ...

Beware the All-Knowing App

Graham Welch | Posted 10.07.2015 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

IBM Continuing to Serve Up the Ultimate Fan and Player Experience

Sam Seddon | Posted 03.07.2015 | UK Tech
Sam Seddon

The amazing thing about Wimbledon is that for 50 weeks of the year it is a private tennis club which evolves for two weeks of the year into a world-class global sporting event delivering fans one of the best, immersive digital experiences here in the UK and beyond - all efficiently enabled by using cloud technology.

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 19.06.2015 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Catching the Big Phish: What Are the Security Risks Facing Financial Organisations?

David Emm | Posted 18.06.2015 | UK Tech
David Emm

With this week being London Technology Week, it seems an appropriate time to raise awareness of these threats so that everyone can use technology with a much lower risk of becoming a victim of cybercrime.

Trouble Communicating With Your Security Team?

Gary Newe | Posted 12.06.2015 | UK Tech
Gary Newe

One piece of advice is putting yourself in the security expert's shoes. By getting to know them and understanding whether their number one focus is on the network, applications, data or infrastructure, you'll be equipped to kick off the conversation in a way which will engage them effectively.

Logging Into Your Email Using Just Your Brainwaves Is Now Possible, Apparently

The Huffington Post UK | Nitya Rajan | Posted 03.06.2015 | UK Tech

Passwords have become a common cause of woe in our hyper connected world of multiple accounts and devices, partly because of our inability to remember...

What Happens After a Cyberattack?

Graham Welch | Posted 21.05.2015 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

The Global Fight Against Cybercrime

David Emm | Posted 29.06.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Billionaires, Icons and Movie Stars - Why Geek Is Now Chic

Gary Newe | Posted 16.06.2015 | UK Tech
Gary Newe

Over the past few years we've seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They're the billionaires, the modern day rock stars, and their many achievements have resulted in a significant change to their status in popular society.

Who is Responsible for Protecting Your Personal Data Online?

Catalin Cosoi | Posted 14.06.2015 | UK Tech
Catalin Cosoi

An overwhelming majority of British adults are now concerned about the online security of their private information, the threats posed by hackers and the possibility of unauthorised access to their data. This was the key finding of recent YouGov research in the wake of the Edward Snowden leaks.

Who's Lurking in Your Mobile?

David Emm | Posted 01.06.2015 | UK Tech
David Emm

Technology is taking over every aspect of our daily lives, and as it does so we become exposed to the associated dangers. One of the biggest threats is the device we carry with us 24/7 - our smartphone.

Criminals Shopping for Your Data

Graham Welch | Posted 30.05.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

"Reports of Bitcoin's Death Have Been Greatly Exaggerated" (With Apologies to Mark Twain)

Peter Greenhill | Posted 31.05.2015 | UK Tech
Peter Greenhill

A massive Bitcoin price drop since the dizzy heights it enjoyed a year ago, UK clearing banks refusing to open accounts for companies in the sector (even those merely supplying software or services to the sector) and the hacking Europe's largest Digital Currency Exchange, Bitstamp, have all been widely reported and referred to by the naysayers.