How Log Management Can Help You Protect Your Systems

Log management is an essential tool in the battle against cyber-crime. It might not be as glamorous as anti-malware software, or the use of honeypots, but it can be the single most important way of preventing a potential hack. It is effectively the gathering of information from your systems. Every PC and server you use will keep an audit of its activity, which gives you valuable insight into the behaviours of its users. You are able to track exactly who logged in at any given time, and where exactly they were accessing. Read more

GCHQ and the Smart Meter Fiasco

Earlier this year, a story was brought to our attention that sent reverberations around the office. As digital security experts, we believe that tightly securing electronic items is an absolute must, and that any company or organisation releasing technology should have a plan in place from the outset. Imagine our surprise when articles regarding the Government Communications Headquarters (GCHQ) surfaced, reporting that the intelligence agency had been forced to intervene in the roll-out of Smart Meters, due to the use of a single encryption key. Read more

The Increased Risk of Hacking Apple Macs

It is estimated that Microsoft have around 90% of the market share when it comes to operating systems. This statistic may be slightly misleading though, as it appears to be based on purchases. It doesn’t necessarily take into account the usage levels. Although most new PC’s have Microsoft windows already installed for example, it doesn’t mean that the user doesn’t install something else. Apple, the main rival to Windows, can also argue that their devices have a longer lifespan, and therefore aren’t accurately represented. Whatever the true reflection, what is clear is that having a far inferior market share isn’t protecting Apple users from hackers any more. Read more

Security for Smartphones

In an increasingly technology-driven and mobile world, our reliance on our smartphones is growing. They are getting smarter, sleeker and able to perform more and more actions that make them essential to the day to day running of our lives. We can run businesses from our phones, access and distribute funds from various banking apps and store databases. We put in private details without a thought, sending information out into the world that in other situations we keep completely confidential. Read more

The Interconnected World

Wherever you have technology that is able to connect to a network, there is the very real risk of cyber-crime.

The emergence of the IoT and the dawning of the Interconnected Home, is set to revolutionise the way we live our lives.

Read more

Contrarisk Security

Do too many small and medium-size enterprises (SMEs) believe that security is something only big firms need to worry about? In this interview, Colin Tankard, managing director of Digital Pathways, explains that, indeed, many firms believe themselves to be too small and uninteresting to attract the attention of hackers.

Listen to the full interview here