UK Covid19 Contact Tracing Apps Go Live

This is an update to our earlier blog "New UK Coronavirus Test & Trace App in Trial". On 12 September 2020 the UK Government for England and Wales announced that their Coronavirus contact tracing app will go live on 24 September 2020. The devolved government in Wales will also use the same app. The UK App... Continue Reading →

Purchasing Services Online – A Pocket Guide

How many times have you been browsing a service online that requires a subscription to continue viewing? I can name quite a few: NetflixMicrosoft Office/365SpotifyAmazon PrimeGoogle's YouTube Premium. Online Services Most online services, like the above, will offer a trial period for free and then expect you to sign-up to a subscription service to continue... Continue Reading →

Threat & Incident Lifecycle Management

It is a good investment to invest in a Threat & Incident Lifecycle Management Procedure since cyber threats show no sign of slowing down. This post is focused on what organisations can do to detect cyber threats, but this will also be useful for individuals and consumers. What is Threat & Incident Lifecycle Management? The... Continue Reading →

Digital Identities

When you are walking about town, or on the Internet, how do you identity that you are you and not some imposter? Current Forms of ID We should all carry some form of physical identification (e.g. a photo driving licence) that can prove who we are, our age and where we live. In the UK... Continue Reading →

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

Router Vulnerabilities

Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020... Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network - namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot... Continue Reading →

Securing your Remote Desktop

This is an extension to my blog Productive and Secure Remote Working and Cyber Security during a Pandemic where I just want to describe an emerging cyber threat relating to home working and in particular remote desktop access. When we are in the office we are protected by a number of systems and firewalls. Our individual PC's... Continue Reading →

Managing and Securing Data

We all have gigabytes of business and personal data that is held in a variety of formats. Do you know what data you have, if it is secured correctly and where it all is? This subject is of massive importance to companies, but is equally important to individuals since you have a trove of data... Continue Reading →

Create a website or blog at WordPress.com

Up ↑