Weekly briefing

Featured

Don’t post pictures of your airline boarding card to social media or you could become a cybercrime victim. In the days when speeds of connectivity made the pace of a glacier seem sprightly, and nobody was connected outside of their home or office cyber-crime was an unknown entity. Back then in the ‘dial up’ years another crime wave was creating […]

Featured

In order to stay on top of all the current cyber threats, use a bit of intelligence. “You are not going to win, you do realise that, don’t you? There are far more of them than there is of you”, as I was once told by an experienced cyber security professional, who was in charge of a major security operations […]

Featured

Why wait until things become critical? Get on board now with the new cyber security legislation. Imagine the doomsday scenario, which as it happens seems to be a popular pastime of most of those gainfully employed in the cyber security industry, where Amazon Prime unexpectedly shuts down for 48 hours, or maybe 72 hours, or maybe even a week. What […]

Featured

The HR department is the perfect fit for taking on the role of cybersecurity culture creators. It is often reported and commented on in the IT and wider business press that in order to mitigate the ever-increasing risk of cybercrime, that an organisation needs to develop a ‘cybersecurity culture’. This is loosely defined as when all members of staff have […]

Featured

What do you do when a support professional asks you to disable your cybersecurity measures? Support contracts have been a mainstay of the IT industry since its inception. Hardware, software, service providers and more all offer their own take on a combination of self-help, chatbots, phone support, remote support and onsite maintenance, for a varying degree of fees. But what […]

Featured

Could a knock on effect of GDPR cause an avalanche of paper work onto an unsuspecting team of customer service and support teams? I’m a bit worried about GDPR. At the moment, there are an increasing amount of awareness seminars, webinars and information events taking place in order to get businesses of all sizes to understand the far-reaching effects of […]

Featured

The natural upgrade cycle of IT hardware can be an opportunity to determine the value of data and how to increase its cyber protection. When undertaking a cybersecurity strategy one of the early processes to undertake is to determine value. Value of the data that your company holds. If this data was lost, or was stolen could that value be […]

Featured

The post WannaCry and Petya world is a money making opportunity for some. After last week’s Petya ransomware outbreak, coming only a few weeks after the WannaCry outbreak a predictable series of events unfolded. Not the technologists urging companies to take preventative actions against such attacks, not the security specialists deconstructing the attack, its origins and its motivations, and its […]

Featured

How long will it take to get into a habit of using basic cyber hygiene techniques? When you come out of a training course, be that one on cyber security from the NCSC, or one that will assist with your continued professional development you always make a little deal with yourself that without fail you will put in practise, starting […]

Featured

Where do you stand on the using private social media accounts as part of an ‘extreme vetting’ policy? The summer is on its way. Before long you will be packing your bags, grabbing your passport and heading off to fun packed family adventures. But how would you feel if when going through passport control, you were stopped and refused entry […]