This is a general category where we will post articles that apply to Cyber Security in general and also articles that do not fit neatly into other categories.
This is an update to our earlier blog “New UK Coronavirus Test & Trace App in Trial“. On 12 September 2020 the UK Government for England and Wales announced that their Coronavirus contact tracing app will go live on 24 September 2020. The devolved government in Wales will also use the same app. The UK App… Continue Reading →
How many times have you been browsing a service online that requires a subscription to continue viewing? I can name quite a few: Netflix Microsoft Office/365 Spotify Amazon Prime Google’s YouTube Premium. Online Services Most online services, like the above, will offer a trial period for free and then expect you to sign-up to a… Continue Reading →
It is a good investment to invest in a Threat & Incident Lifecycle Management Procedure since cyber threats show no sign of slowing down. This post is focused on what organisations can do to detect cyber threats, but this will also be useful for individuals and consumers. What is Threat & Incident Lifecycle Management? The… Continue Reading →
When you are walking about town, or on the Internet, how do you identity that you are you and not some imposter? Current Forms of ID We should all carry some form of physical identification (e.g. a photo driving licence) that can prove who we are, our age and where we live. In the UK… Continue Reading →
We have talked about Phishing and Social Engineering in other blogs and the standard precautions you can take to help thwart cyber criminals attempts at fraud. Business Email Compromise (BEC) is a form of cyber crime which uses email fraud to attack commercial, Government and non-profit organizations to achieve a specific outcome which negatively impacts… Continue Reading →
A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems… Continue Reading →
Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →
The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network – namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot… Continue Reading →
Being online these days, especially in the current environment when so many people are working from home and outside the protection of the company network, we all need to be extra vigilant that we don’t click on a link to malware. This blog is going to go through a number of tips to keep you… Continue Reading →
This is an extension to my blog Productive and Secure Remote Working and Cyber Security during a Pandemic where I just want to describe an emerging cyber threat relating to home working and in particular remote desktop access. When we are in the office we are protected by a number of systems and firewalls. Our individual PC’s… Continue Reading →
We all have gigabytes of business and personal data that is held in a variety of formats. Do you know what data you have, if it is secured correctly and where it all is? This subject is of massive importance to companies, but is equally important to individuals since you have a trove of data… Continue Reading →
Something went wrong. Please refresh the page and/or try again.
Headline image provided by ShutterStock.