Posts by Admin
Coronavirus: Remember to stay safe online too
By Chloe Wood. It has been 99 days since Boris Johnson announced to the UK that we will be going into lockdown due to Covid-19. This lockdown saw us swap our offices, to make-shift home set ups. Although lockdown rules are starting to be eased in the UK, (I’m sure we all can’t wait for…
Read MorePasswords and Paranoia
By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for a streaming site, subscription service, or online store and have been met with the daunting “Choose a Password” screen, with an endless list of criteria to follow to ensure a strong password. But you haven’t…
Read MoreThe importance of Ethical Hacking
By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to aid and facilitate their functions and processes, it becomes necessary for them to test the safety and security of these IT systems. Small and medium-sized enterprises also known as SMEs, are especially vulnerable to cyber…
Read MoreMinimising risk in business: the relevance of cybersecurity and data protection
By Ivan Seifert. Despite being a term on everyone’s lips and an increasing wealth of information becoming available online, cybersecurity remains somewhat of an abstract concept. This may have something to do with its intangibility or perhaps more simply because most us don’t feel the need to gain knowledge of the topic and apply it…
Read MoreYour PC taken hostage
As with any hostage situation, there is no guarantee that by paying the ransom, you will be granted access to your PC; by paying on time, you may be able to access your files again. Missing the deadline could result in the ransom amount increasing or all of your files being deleted or released into the public domain.
Read MorePersonal Cyber Hygiene
The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims of cyber crime in the UK in 2015. There are simple ways to improve the security of your personal data and that of your business, from the mouth of industry and government experts.
Read MoreDecrypting the encryption debate.
As the encryption-security-privacy saga continues into 2017, more actors and cases will bring this subject to head.
Read MoreRisk in the Internet of Things
By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how we as individuals increasingly embed the use of internet-dependent devices to make our lives easier. However, there is a much more prevalent, but less discussed of late, practice of using this same IoT to run…
Read MoreEstonia: how the country became ‘poster child’ for national cyber security.
In 2007, Estonia experienced a cyber attack on an unprecedented scale crippling the banking sector to the media.
Read MoreWho watches the watcher?
By Aqsa Hussain.. We have all heard about the whistleblowing scandal of 2013 which erupted in the USA resulting in a monumental leak of classified CIA files. Edward Snowden, the former contractor at the NSA and man responsible for this scandal soon after became the ‘coverboy for unpatriotism’ for some and heroism for others. Amongst…
Read MoreHipster counter-espionage?
The changing effect of modern-terrorism and technology, has made surveillance an even more intrinsic aspect of society. Perhaps, greater transparency in the revealing of successful operations would justify their existence e.g. the capture of dark-net paedophiles. However, this is a difficult request as the intelligence community naturally seeks to retain the cloak of secrecy and independence to operate.
Read MoreIOT – progress or cyber madness?
We are constantly talking about reducing the attack surface and providing less opportunity for the bad guys to get in. IOT changes things…
Read More