Hacking for Good and Evil

At Digital Pathways we talk a lot about ‘hackers’, generally describing them as cyber-criminals whose sole intention is to cause damage to individuals and corporations. We often describe the nefarious means by which a hacker endeavours to force entry into your system and obtain valuable information or data. We paint them as malicious, creating chaos online for no other reason than their own personal gain, or the simple destruction of others. Equally, they are highly adept computer programmers, with an in-depth knowledge of the digital world and the ways in which it can be manipulated. Read more

Digital Security Solutions for SME’s

When it comes to digital security, the attitudes of small business owners are beginning to change. Across the UK, and across multiple sectors too, we are beginning to see a shift towards companies protecting themselves more robustly online. Still though, and regardless of the media coverage of hacking scandals, there are some who still refuse to believe that there is a very real threat that surrounds them. Read more

How Will Brexit Affect Digital Security in the UK?

The decision of the United Kingdom’s electorate to vote to leave the European Union has left us all with a number of yet unanswered questions. Many are asking how this decision will affect trade. Will we really be able reduce immigration by refusing the freedom of movement, whilst still retaining access to the EU’s single market? What will happen to the 1.3 million Britons who currently live abroad and the 2.9 million (5% of the population) of European migrants who live in the UK?  In the immediate aftermath, questions were also being asked over leadership and who was best placed to take David Cameron’s position at Number 10. We now know that Theresa May will be the one to invoke the infamous ‘article 50’ and lead us through negotiations with the remaining nations. Read more

How to deal with Whaling as a Cyber-Security threat

The practice of phishing as a means for cyber-criminals to obtain sensitive information from an online user is rife. Usernames, passwords and credit card details are all at risk, with the theft of money often the ultimate goal of the hacker. The most common method of phishing is for the criminal to send out an email that gives the impression that it has come from an official source. This email will likely have a link that leads to somewhere harmful, or an attachment that has malicious intent when opened. Read more

When is a cyber-attack not an attack?

The Impact of Website Hacking

When is a cyber-attack not an attack? An interesting conundrum, but one that many website owners are beginning to consider thanks to a new wave of cyber-crime that is sweeping the internet. We have covered a number of topics through the Digital Pathways blogs that deal with the obvious repercussions of a hack or cyber-attack. When it comes to the Risks of Ransomware for instance, the dangers are obvious, namely the encryption of your data by a hacker who then blackmails you for its return. Targeted phishing too has quite evident consequences, with the release of malware onto a network that subsequently leaks your important data. Website hacking in contrast is not a denial of service attack. In fact, you might not even know you’ve been hacked. Read more

Is changing your password a good idea?

For years it has been common practice to regularly change the passwords you use for key logins. Users have been repeatedly encouraged to come up with unique variations in an attempt to help keep cyber criminals at bay and to safeguard against hacking. But, in what some people are finding a confusing turnaround, the UK government has now repeated advice against doing exactly this, claiming instead that it plays directly into the hands of those you are trying to protect against. Read more

The Dangers of Voicemail Phishing

Picking up the phone is a hazardous business these days. Whether it is a call regarding PPI for an account that never existed, or an imaginary problem with your PC that desperately requires attention, there are a lot of reasons to ignore what comes down the line. One place you can consider yourself safe though is surely voicemail. The cold callers generally avoid leaving a message, and anything that does squeak through can be ignored and deleted. So where does Voicemail Phishing enter the equation, and why are we warned that it is on the rise? Read more

Hacking Buildings – Is your building at risk of being hacked?

When you stop to think about the businesses who have been hacked in recent years, there have been some quite big names under the spotlight. Organisations such as Sony and Ashley Madison are good examples of recent scandals. These companies, although working on digital platforms, were subject to some quite serious breaches that have severely affected the way they are able to operate. The reason why is simple; lack of security as a result of lack of knowledge. But although ‘Digital’ businesses, surely the same thing couldn’t happen to a company as technology leading and digitally savvy as Google. Could it? Read more

ObserveIT – Insider Threat Detection and Prevention Software

The Insider Threat is a growing concern among businesses. The idea that an attack, be it vicious or unintentional, can come from an internal source is frightening. Organisations put a lot of trust in their employees, and quite rightly too, but when it comes to digital security it pays to be slightly more vigilant. Many larger companies are beginning to see the value in software that monitors their employees’ actions, logging the data so that if and when disaster strikes it can be traced back to the party at fault. Unfortunately, this is very much locking the door after the horse has bolted. Luckily, there is a preventative measure available. Read more

How to Deal with Ransomware

A digital security risk that appears to be becoming more prominent in the mainstream media is ransomware. Stories are beginning to surface more and more frequently, both highlighting the sheer volume of attacks and also focussing on the more targeted examples of hospitals and schools who have been left helpless. As the name suggests, Ransomware is a form of malware that encrypts your data so that it becomes unreadable, and then proceeds to extort money from you to receive a code that unlocks it. Traditional blackmail revolutionised for a digital age. Read more