It Security

Corporate Procrastination: IT Security's Biggest Weakness

Jon Lucas | Posted 20.06.2017 | UK Tech
Jon Lucas By now, there's no excuse for ignoring IT security - lack of awareness is no longer...

How To Create A Cyber Security Playbook

Paul Rose | Posted 22.02.2017 | UK Tech
Paul Rose

All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

Will The Lack Of Skills Hamper The Government Ambition For Increased Cyber Security?

Anthony Sherick | Posted 03.11.2016 | UK Tech
Anthony Sherick

To build a booming market for talent, this should include subsidised training for individuals and corporates, apprenticeships and particularly a strong effort or financial incentives to grow the take up and offerings of Cyber Security degrees. Promotion and awareness of the industry and the opportunities available needs to be wide reaching.

Small Business Has More at Stake Than Most

Mike Foreman | Posted 10.08.2014 | UK Tech
Mike Foreman

Unsurprisingly this caused widespread alarm among thousands of computer users everywhere. But it's small business that should pay closest attention because they have more at stake than most. It's not just that the safety of their financial data is crucial to their prosperity.

Small Business Must Come to Terms With Life After XP

Mike Foreman | Posted 06.07.2014 | UK Tech
Mike Foreman

We continue to monitor and manage the security of a high number of XP systems and while these high levels remain we continue to support those customers who depend on XP to run their business.

Government's Online Start-ups Push Is Admission of Broadband Postcode Lottery

Mike Foreman | Posted 02.04.2014 | UK Tech
Mike Foreman

For small businesses to thrive it is vital they get off the ground quickly. So it makes perfect sense that as part of this initiative the government is committed to a package of measures worth £1.1 billion aimed at stimulating entrepreneurial growth.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

Privacy Climbs the Small Business Security Agenda

Mike Foreman | Posted 08.12.2013 | UK Tech
Mike Foreman

Any small business that thinks their modest size means they are not a target for cyber criminals only needs to look at the bigger picture. Taken together SMBs represent a substantial proportion of the market.

Context in Security Is Everything

Graham Welch | Posted 22.11.2013 | UK Tech
Graham Welch

Context-aware security is about making use of additional information to improve security decisions at the time the decision is made. By doing this, it ensures that more accurate security decisions are taken to provide better protection against advanced threats.

IT Security: Can You Really Rest Upon a Cloud?

Lee Mannion | Posted 19.11.2013 | UK Tech
Lee Mannion

In the pre-internet era, data security was essentially endless files filled with thousands of documents. It is hard to believe that there was a pre-internet way of doing business securely at all, or that any business that operated during those times is still going today. It must have been a head spinner to adapt to new technologies.

Rise of the droid

Graham Welch | Posted 12.11.2013 | UK Tech
Graham Welch

It seemed all the world's newswires went into meltdown this week at the exciting news of a pair of new Apple iPhones soon becoming available. But while Apple continues to command a huge share of the growing smart phone market, it is use of Android phones that continues to expand at the biggest rate.

Follow the Money

Graham Welch | Posted 09.10.2013 | UK Tech
Graham Welch

For most of today's cybercriminals their activities are not a hobby to brag about with mates. What they do is a serious business to them and they employ many of the best 'traditional' business practices mainstream companies use with the goal of making money. Today's cybercriminal gangs are highly professional and motivated.

Going Retro in the World of Digital

Graham Welch | Posted 17.09.2013 | UK Tech
Graham Welch

Security is now a question of trying to think like the attacker and assume that something bad will eventually happen. Today knowing what you are going to do before, during and after the attack is the thing that will make the difference and lessen the embarrassment and damage a breach could ultimately cause.

Please Switch Off Your Electronic Devices.....

Graham Welch | Posted 02.09.2013 | UK Tech
Graham Welch

why is it we seem to value physical over digital so much? We often act very much more recklessly in the digital world than the physical. After all how many of us have taken directions from a friend or colleague to visit a certain website without a second thought? Few people take the trouble to check the validity of the website we are visiting before we go there, or even know what to look for.

Lax Consumer Habits Online Are on Collision Course With Business Security

Mike Foreman | Posted 27.08.2013 | UK Tech
Mike Foreman

the rapid rise in smartphones and tablets has led to a work phenomenon commonly referred to as BYOD (Bring Your Own Device). Coupled with Cloud-based business services, this has been a real game changer. So blurred have the boundaries now become that the more cavalier Internet habits of relatives and friends of every staff member have the potential to set the consumer and business world on a collision course.

Time to Test Defences

Graham Welch | Posted 25.08.2013 | UK Tech
Graham Welch

We need to recognize that the cybercriminals who carry out today's attacks are professionals. They are well funded, well resourced and they bring in the right expertise to do the job they are paid to do. They are often in it for the long game and they will work for days, weeks, months or even years to find a weak link and exploit it.

Cybercrime is Bankers' Biggest Threat - It's Official

Graham Welch | Posted 13.08.2013 | UK Tech
Graham Welch

The problem for the hard pressed banks' Chief Information Security Officers is that today's attacks are not noisy ego driven dares by bored youngsters, rather they are well-funded, highly motivated attacks by criminal gangs using the full power of the internet to resource and carry them out. It is also all about making money rather than fame as the motivation for such hacks and attacks.

Money: The Root(kit) of Cyber Evil

Graham Welch | Posted 16.07.2013 | UK Tech
Graham Welch

Indeed today's cybercriminal gangs are so well organized that often they buy "off the shelf" rootkits and software which they use to carry out their activities. Often this software comes with manuals, 24/7 tech support and even in extreme cases advertising!

The Next Big Thing in Security Is...

Graham Welch | Posted 23.06.2013 | UK Tech
Graham Welch

Today the bad guys are increasingly well-financed, professional and work hard to develop new ways to get through defences. At the same time, we increasingly live our lives online which means the information and data we hold on our PCs and networks are valuable assets that can be traded and used.

BYOD Threatens to Create an IT Shadow Culture

Mike Foreman | Posted 12.06.2013 | UK Tech
Mike Foreman

When it comes to the Bring Your Own Device (BYOD) to work debate you probably think you've heard it all. But have you considered how BYOD may be introducing risks other than simply exposing company data to unprotected devices?

Another Day, Another Hack

Graham Welch | Posted 28.05.2013 | UK Tech
Graham Welch

Switch on the TV or scan the headlines and somehow it's become a case of another day, another hack. Multinational companies, governments, global news organizations, social networking sites, celebrities and politicians are all among those that have been left counting the cost of assaults on their e-mail systems and websites.

Children Of The Digital Revolution

David S. Gibson | Posted 21.05.2013 | UK Tech
David S. Gibson

In a single generation, digital collaboration has completely changed the way we communicate and work. Ubiquitous connectivity and digitized information may be the most significant global change to take place since the transportation revolution.