Cybersecurity

What Happens After a Cyberattack?

Graham Welch | Posted 21.05.2015 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

The Global Fight Against Cybercrime

David Emm | Posted 05.05.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Billionaires, Icons and Movie Stars - Why Geek Is Now Chic

Gary Newe | Posted 16.04.2015 | UK Tech
Gary Newe

Over the past few years we've seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They're the billionaires, the modern day rock stars, and their many achievements have resulted in a significant change to their status in popular society.

Who is Responsible for Protecting Your Personal Data Online?

Catalin Cosoi | Posted 15.04.2015 | UK Tech
Catalin Cosoi

An overwhelming majority of British adults are now concerned about the online security of their private information, the threats posed by hackers and the possibility of unauthorised access to their data. This was the key finding of recent YouGov research in the wake of the Edward Snowden leaks.

Who's Lurking in Your Mobile?

David Emm | Posted 02.04.2015 | UK Tech
David Emm

Technology is taking over every aspect of our daily lives, and as it does so we become exposed to the associated dangers. One of the biggest threats is the device we carry with us 24/7 - our smartphone.

Criminals Shopping for Your Data

Graham Welch | Posted 01.04.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

"Reports of Bitcoin's Death Have Been Greatly Exaggerated" (With Apologies to Mark Twain)

Peter Greenhill | Posted 31.03.2015 | UK Tech
Peter Greenhill

A massive Bitcoin price drop since the dizzy heights it enjoyed a year ago, UK clearing banks refusing to open accounts for companies in the sector (even those merely supplying software or services to the sector) and the hacking Europe's largest Digital Currency Exchange, Bitstamp, have all been widely reported and referred to by the naysayers.

Five Simple Steps for Smartphone Security

Simon Specka | Posted 31.03.2015 | UK Tech
Simon Specka

Smartphones also face threats from hackers and thieves, while malware such as ad libraries have become a growing problem in app stores. To make sure you're not on the receiving end of a hacking scheme, here are a few simple steps for keeping your smartphone secure.

Ransom Crypto Locker: Your Personal Files Are Encrypted - Be Aware

Shirley Palmer | Posted 25.05.2015 | UK Tech
Shirley Palmer

These people are sophisticated in their approach with details, links, info etc. and you simply have to follow their guidelines. It was with baited breath that I decided the only way forward was to pay them - much to my disgust. Within ten minutes of them receiving the payment I received the key to decrypt my files.

10 Steps to Mitigate a DDoS Attack in Real Time

Gary Newe | Posted 20.05.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

A Month in the Life of the Fight Against Cybercrime

David Emm | Posted 09.05.2015 | UK Tech
David Emm

Once inside the system, hackers are able to move around the system until they find their points of interest - staff and processes that allow them to extract money from the infected system. The worrying thing is that this attack is still active.

People Remain the Weakest Link in Security

Graham Welch | Posted 05.05.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

Is It Time for That Spring Cleaning?

Graham Welch | Posted 26.04.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

Don't be Vulnerable this Valentine's Day

David Emm | Posted 15.04.2015 | UK Tech
David Emm

Even though we might hear about the risks time and again, it's important that we keep an eye on our connected lives as much as our wallets or handbags.

Data, data, everywhere...

Graham Welch | Posted 13.04.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

Is Google's 'Project Zero' Leaving Windows Users Vulnerable?

Catalin Cosoi | Posted 28.03.2015 | UK Tech
Catalin Cosoi

This issue seems to have been more one of timing, rather than not having the manpower to fix a patch within the allocated timeframe.

'Bro' Cameron Gets White House Boost Before The Election

PA/Huffington Post UK | Paul Vale | Posted 16.01.2015 | UK Politics

Barack Obama gave David Cameron’s team a pre-election boost with a high-profile endorsement at a joint press conference at the White House on Friday...

North Korea's Internet Went 'Dark' On Monday

The Huffington Post UK | Thomas Tamblyn | Posted 23.12.2014 | UK Tech

North Korea's internet suffered a complete blackout on Monday 22 December and even now is still reportedly suffering from intermittent connection prob...

Cybersecurity: 'Be Paranoid - It helps'

Caroline Hyde | Posted 11.02.2015 | UK Tech
Caroline Hyde

Well, in the news they seem to be....and doesn't Sony know it. It is the latest big company to be thrown into the media spotlight as a result of highly embarrassing data breaches, reported to have occurred in both its Pictures and PlayStation units.

Prepare for the Festive IT Headache

Graham Welch | Posted 06.02.2015 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 02.02.2015 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

Blaming Facebook for Terrorism Is Not the Answer

Paul Blanchard | Posted 30.01.2015 | UK Tech
Paul Blanchard

The Internet is a vast place. Bigger than anyone, except a computer scientist, can imagine. It's a massive iceberg. What we see via Google and any other search engine is called the Clearnet and is potentially less than two per cent of what's actually out there, buried deep down in the Darknet or Deep Web.

Spycam Hacking Shock

Graham Welch | Posted 21.01.2015 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

Cyber Security: The New Frontier in Crisis Preparation

Adam Fisch | Posted 20.12.2014 | UK Tech
Adam Fisch

SnapChat, iCloud, JP Morgan, Tesco, Target, Adobe. Over the past 12 months all of these have associated with cyber-attacks.