Cybersecurity

Cyber Attack! 60% of Small Companies Out of Business in Six Months

Shivvy Jervis | Posted 06.04.2014 | UK Tech
Shivvy Jervis

Coaching your employees on data protection just isn't enough. In the video, Holman speaks to this point, explaining "You could buy the most high-tech security software, then the admin guy whacks a generic password on it ... and you're sunk".

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 04.03.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 25.02.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

Keeping Britain Safe and Prosperous Online

Victoria Woodbine | Posted 11.03.2014 | UK Tech
Victoria Woodbine

In its first year, the programme focused on understanding the problem. Threats in cyberspace are growing: over the past year, some 93% of large companies (and 87% of smaller ones) reported a cyber breach. Understanding these threats, and being able to detect them, was a vital first step.

Big Data in 2014: Five Predictions

Mark Braund | Posted 11.03.2014 | UK Tech
Mark Braund

2013 was a year in which big data became a 'hot topic' for discussion and debate, reaching far beyond the usual industry journals and making the mainstream news for a number of good and bad reasons. With that in mind there has been a great deal of speculation about what trends we should expect to see in big data in 2014.

Businesses Listen Up: Take the Threat of the 'Dark Web' Seriously

Shivvy Jervis | Posted 17.02.2014 | UK Tech
Shivvy Jervis

Being prepared means understanding the nature of these dangers - and really that means recognizing the importance of the dark web as part of any information security strategy.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

It's the Most Wonderful Dangerous Time of the Year

David Emm | Posted 01.02.2014 | UK Tech
David Emm

We're particularly vulnerable at Christmas. Many of us now routinely shop online, because it's quick and convenient. But at Christmas the volume of online transactions goes through the roof.

Don't Let CryptoLocker Hold Your Business to Ransom

Mike Foreman | Posted 25.01.2014 | UK Tech
Mike Foreman

CryptoLocker shows that this is just the kind of complacency that criminal gangs are banking on. Gene Marks, a well-known small business writer and commentator, certainly seems to agree.

The Weakest Link in Cyber Security - Staff

Graham Welch | Posted 25.01.2014 | UK Tech
Graham Welch

It seems people cannot stop themselves clicking on links they receive in emails without even the most cursory check on whether it is a valid link or not. It is an easy step often overlooked that you hover your mouse over the link and see what web address it is trying to send you to.

A Brave New World: The Revolutionary Potential of Modern Technologies?

Ayesha Carmouche | Posted 23.01.2014 | UK Tech
Ayesha Carmouche

The revolutionary impact of fast spreading digital and mobile phone technologies underpin an on-going conversation, yet to reach its conclusion. From the perspectives of non-violence and social development, optimists argue that a mass communication infrastructure enables campaigners to challenge the conditions of injustice and oppression.

Testing Times for UK Banks

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

For years the cyber security industry has talked about the latest silver bullet that will protect against the latest threat. But the sad fact is despite millions of pounds being spent to protect institutions around the world, cyber attacks seemingly continue day after day.

The PC Is Dead; Long Live the Tablet

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

Of course the PC is not going to be replaced completely in business. But such is the power and flexibility of today's mobile devices, and the willingness of businesses to embrace the often-hyped 'Bring Your Own Device' movement, that means we as users are making more and more use of mobile devices not just to watch funny kitten movies, but also to do our 'normal' business day-to-day.

British Man Charged With Hacking Into Nasa

PA/Huffington Post UK | Posted 28.10.2013 | UK

A British hacker has been charged with breaking into the computer systems of the US army, Nasa and other federal agencies. The 28-year-old, named a...

Making Sense of Threats for SMBs

Allen Scott | Posted 23.01.2014 | UK Tech
Allen Scott

The world of data security is complex and moving fast. Most companies have enough to do managing their core business than to spend time on IT, let alone maintain a specialist's knowledge of security...

My "Power Three" for Making Life Difficult for the Bad Guys (and They Are All Technology-agnostic!)

Conrad Constantine | Posted 21.12.2013 | UK Tech
Conrad Constantine

There's been a lot of talk about how to use technology to protect against advanced targeted attacks, but in fact, technology is rarely the issue. These basics must be covered first and foremost before you even begin to think about technology.

Cyber Warfare: The Modern Cold War?

Peter Armstrong | Posted 23.01.2014 | UK Tech
Peter Armstrong

It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.

Context in Security Is Everything

Graham Welch | Posted 22.11.2013 | UK Tech
Graham Welch

Context-aware security is about making use of additional information to improve security decisions at the time the decision is made. By doing this, it ensures that more accurate security decisions are taken to provide better protection against advanced threats.

Rise of the droid

Graham Welch | Posted 12.11.2013 | UK Tech
Graham Welch

It seemed all the world's newswires went into meltdown this week at the exciting news of a pair of new Apple iPhones soon becoming available. But while Apple continues to command a huge share of the growing smart phone market, it is use of Android phones that continues to expand at the biggest rate.

The Case for Cyber Capacity Building

Victoria Woodbine | Posted 05.11.2013 | UK Tech
Victoria Woodbine

The UK's National Cyber Security Strategy aims to increase the scale and impact of these efforts by building resilience globally and assisting those countries that lack the infrastructure and expertise to protect their cyberspace, while also working to ensure cyberspace supports innovation, economic growth and social benefits.

Madness at Our Fingertips

The Mac Twins | Posted 30.10.2013 | UK Tech
The Mac Twins

We recently appeared on BBC's Free Speech and after having had a couple of weeks to mull and chew over one of the topics, I felt I needed to offload my musings on it, so here goes...

Follow the Money

Graham Welch | Posted 09.10.2013 | UK Tech
Graham Welch

For most of today's cybercriminals their activities are not a hobby to brag about with mates. What they do is a serious business to them and they employ many of the best 'traditional' business practices mainstream companies use with the goal of making money. Today's cybercriminal gangs are highly professional and motivated.

A Cyber Health Check for Business

Victoria Woodbine | Posted 06.10.2013 | UK Tech
Victoria Woodbine

The project is a great opportunity for company Boards to understand and manage risks that have the potential to cause major damage to their business. Companies can demonstrate leadership by making cyber a major part of risk management across their whole business.