The Risk of Cyber Crime – The UK Vs the USA

Throughout the combined histories of the UK and the USA, with the latter that much shorter than the former, it is safe to say that the Americans have attempted to lead the way when it comes to revolutionary acts around safety. Their stance on cyber security is no different and the UK faces falling way behind when it comes to protecting itself against online threats unless it attempts to keep up with its partner across the Atlantic. With the Americans pushing forward in their attempts to protect against attacks, security will be tightened and cyber-crime, in theory at least, directed elsewhere as a consequence.

What is the true cost of a cyber attack?

Sony Entertainment Pictures – Recovering from Hacking?

Last year saw perhaps the most high profile cyber-attack in history. Sony Entertainment Pictures were the target, ‘punished’ by hacking group ‘The Guardians of Peace’ for their planned release of the film ‘The Interview’, in which Hollywood stars Seth Rogan and James Franco plan to assassinate North Korean leader Kim Jung-Un. The major media and electronics group were shown the power of the hackers when 47,000 records from employees were compromised and several top upcoming film titles and trailers were released early.

Cyber Security Misconceptions – Fact or Fiction?

When it comes to Cyber Security it is often difficult to keep up with what is fact and what is scaremongering. If Digital Security isn’t your core business then it makes sense to seek advice and find out once and for all whether the threats are actually real and whether you really should be investing in the new technology you’ve heard so much about.

Communication Security with Server Cloaking

The debate that began with the introduction of a new Investigatory Powers Bill in the Queen’s Speech earlier this year is still raging. It raises a number of questions about exactly how online communication and security is able to be maintained and protected when you consider the reduction in encryption that is being introduced. By providing virtual back doors across the digital world can you ever really have a secure network? And does unveiling the threats that encryption covers up outweigh the potential risks for personal data? The argument is likely to continue for some time.

Mobile Security – How secure is yours?

The weaknesses in mobile device security are becoming more and more evident with every new app release and technological advance. A recent report estimated that 95% of all Android phones in use are vulnerable to attack. That is a staggering 950 million devices that enable cyber criminals to potentially seize your data and gain access to your networks.

Celebrity Hacks – What Lessons Can We Learn?

The relatively new phenomenon of ‘Fappening’ began last year with the release of private and mostly compromising pictures of some fairly prominent celebrities. Recent reports state that almost 600 celebrity iCloud accounts were hacked last year, with the alleged offender appearing to access each account over 3,000 times over a 12 month period.

Comms Business Awards

Official Comms Business Awards video 2015, where Digital Pathways were proud sponsors of Channel Sales Person of the Year, winner Kyla Stack with a very entertaining David Walliams as the evenings host.

The Cost of Security for UK Business

Computer Weekly

The draft Investigatory Powers Bill to increase surveillance is already controversial, but there are growing concerns over the potential economic consequences.

First announced during The Queens Speech in 2012, the Draft Communication Data Bill, as it was known then, was met with widespread criticism, before it was ultimately dropped during the coalition government in 2014.

With the Conservative party winning a majority government in the 2015 general election, the so-called “Snoopers’ Charter” has once more come to the fore. It was revealed during the Queen’s Speech on 27 May 2015 that a new Investigatory Powers Bill would “modernise the law on communications data”.

Read the full article

Digital Security for Business on the Move

If you are a frequent traveller, either for business or for pleasure, then you may well take for granted the security of the devices you carry. Wherever you are travelling, if you include a laptop or mobile as part of your luggage then it is vitally important that you look to protect and secure your systems for use on the move. More and more businesses are utilising cloud technology to store their data and keep it protected, thinking that this alone will help them avoid leaking or losing their documents. What about the devices themselves though? Are they so vehemently protected? The vulnerability of a mobile device is that, without the required security measures, it offers instant access to files and documents that are no longer simply stored away on a single office computer.

Authentication Systems – The End of Passwords?

There are many ways in which the internet has made our lives simpler and expanded our horizons. It allows us to connect easily with people from across the globe, organise our banking transactions wherever in the world we are and buy whatever we need whenever we need it with just the touch of a button.