The Rise of the Insider Threat

Many view the services of cyber security specialists as a way to protect against faceless, nameless hackers who are sending harmful attacks externally. By putting up walls around your network, and manning them on your behalf, these companies keep your organisation safe from attack, and breaches of confidential data. An issue that is becoming more and more prevalent in the security industry though is the insider attack. It has highlighted the fact that just because the wall is up, it doesn’t mean that you are safe from a data breach, either from an intentional act or an accidental one. Read more

new years eve

Cyber Security Predictions for 2016

For many in the cybersecurity spectrum, 2015 was considered ‘The Year of the Hack’. A record number of attacks, of all varieties and levels of viciousness, were undertaken last year, bringing digital security and online protection to the forefront of both people’s minds, and the media’s attention. Many companies will feel that they have now caught up again, and feel safe from potential hacks. This is though, in reality, a false security. Whilst businesses have been playing catch-up, criminals have been evolving their own methods, and will always be looking to find that advantage that keeps them one step ahead in the game. Read more

blog Phishing

How To Avoid the Bait of Phishers

When it comes to cybersecurity attacks, by far the most common is that of phishing. This form of attack is performed by criminals who acquire sensitive or personal information from victims through the use of deception. Hundreds, if not thousands of emails will be sent out to unsuspecting recipients and made to look as if they have been sent by a reliable source, for example, a bank or some other trusted organisation. In reality, this is a rouse in order to gain access to your confidential data, such as usernames, passwords or credit card details, or, failing that, they may instead look to utilise your mail server and send emails to your contact list.

Read more

cloud storage

Why Using Third Party Firms is a Risk to your Data

When it comes to digital security, the use of third party firms to supply you with IT solutions is generally a risky option. A third party firm is anyone who you pay to supply IT services, and that has access to your data. You may rely on a company to store certain documents, for example. The risk here is that your data is exposed to their system administrators to view, share and, should they choose to, sell. This potentially valuable data could find its way into the hands of your competitors, and cause irreparable damage. Read more

butler icon

The Dangers of Software As A Service

The cloud is a fantastic piece of ingenuity. The ability to store huge amounts of data away from your machine creates a wealth of space, as well as ensures that your documents are accessible from anywhere on the globe. The cloud as a concept is a brilliant one and gives companies the ability to sell software as a service. Rather than simply sell a customer a storage device, they are able to instead charge an ongoing rate. Big industry names, such as Salesforce and Sage, are such big hitters in the market thanks in part to their ability to utilise the cloud to create a more seamless experience. Everything about the cloud seems to work. Everything except its security.

Read more

risks ahead

Viewing Digital Security like Health & Safety

In digital security terms, 2015 has been the year of the major corporation hack. With Ashley Maddison in September, Carphone Warehouse in August and now TalkTalk, Weatherspoons, VTech and Marks and Spencer all in the past month, yes, 2015 really has been an incredible year for highlighting the ineptitude and naivety with which the companies we trust hold our personal data. Despite how things seem though, these ‘leaks’ may actually be a blessing in disguise and good news for individuals, as well as bad. Read more

London Night

The Impact of Hacking on TalkTalk

When a cyber-attack hits a major, national company, the affect it has is obviously widespread. TalkTalk are one of the more recent cases were a data leak has created scandal in the media and, more importantly, severely impacted on people’s lives. The attack is likely to cost the company up to £35million, with 157,000 customer’s having suffered from their personal details being leaked, from addresses and phone numbers, to bank accounts and sort codes. Read more

The Professional Risks of Webcams

Whether it is the risk of using a webcam in a personal capacity, or the potential business repercussions, it is vital that people begin to realise the dangers involved with built-in camera devices. We looked at certain aspects of this in our previous post, Protection from Webcam Hackers, where stories of couples getting caught out in bed and baby monitor footage being streamed elsewhere were the key concerns we covered. As well as risks from a personal perspective, there are also risks to you professionally as well, both regarding your data security and the streaming of compromising images. Read more

safe lock

Protecting your bank accounts from cyber-attack

The way in which criminals steal money from banks has evolved. Whereas once upon a time you were required to wear tights on your head and have a sawn-off shotgun in hand, in the digital age it takes nothing more than a virus to access and ‘lift’ nearly £20 million. Earlier this month that was exactly what happened too, with online banking the target for cyber criminals. The attack uses a malware product known as Dridex to infect a consumer’s device and steal their banking details. The virus is said to account for nearly $100m worth of theft so far, presenting itself as a document attachment in a seemingly legitimate email that grants instant access when opened. Read more

working from home

Securing a Corporate Laptop for a Home Network

The business world is embracing and adapting to the possibilities of mobile working at an alarming rate. Thanks in equal parts to the ingenuity of cloud storage and the growing power of laptops and tablets, the ability to take a corporate device home is opening up a world of opportunity to employees, especially when you consider the practicalities of having your data with you at all times. As with most things digital, businesses will often tip in favour of efficiency and practicality over security, not recognising the damage that a home network can do to a corporate machine. Read more