VoIP image

Voice Over IP Insecurity

The use of Voice Over IP (also known as IP telephony, or VoIP) has brought huge benefits to businesses, as well as potentially harmful implications. The financial and productivity benefits of VoIP technology have been drawing companies in for many years. It is a cost-effective method of communication, as well as efficient, with forwarding, remote operation and conferencing aspects all now commonplace in offices across the country and the world. It is also a fantastic way for cyber criminals to eavesdrop on conversations and steal valuable data from your company.

Read more

Managed security image

The Value of a Managed Encryption Service

People often talk about the efficiency of the cloud. It is the way it enables users to access their documents across continents on portable devices and share seamlessly with friends and work colleagues. The use of cloud storage is growing in popularity day by day, as businesses begin to realise this value. Other managed security services, such as infrastructure (IAAS) and outsourced server management also allow businesses access to vital technological advances in a cost effective way, helping companies to embrace the ‘digital age’. Read more

Protection from Webcam Hackers

The more eagerly people clamour for technology in their lives, the more they should concentrate on protecting their privacy and security. In a world that is dominated by smartphones, tablets and the Internet of Things, it is important to remember that you are inviting more than just the latest gadget into your life and into your home. Given the opportunity, you are also giving hackers direct access to a place where you should feel at your safest. Read more

network image

Preparing for the Internet of Things – The Car Hacking Scandal

Once upon a time security could be confined to an office space, with only trusted computers used and protection reserved for those behind your firewall. IoT has changed all of this, and security is now being asked to spread outside of these perimeters, something that most businesses are simply not capable of doing. Read more

US v UK button

The Risk of Cyber Crime – The UK Vs the USA

Throughout the combined histories of the UK and the USA, with the latter that much shorter than the former, it is safe to say that the Americans have attempted to lead the way when it comes to revolutionary acts around safety. Their stance on cyber security is no different and the UK faces falling way behind when it comes to protecting itself against online threats unless it attempts to keep up with its partner across the Atlantic. With the Americans pushing forward in their attempts to protect against attacks, security will be tightened and cyber-crime, in theory at least, directed elsewhere as a consequence. Read more

sony logo

What is the true cost of a cyber attack?

Sony Entertainment Pictures – Recovering from Hacking?

Last year saw perhaps the most high profile cyber-attack in history. Sony Entertainment Pictures was the target, ‘punished’ by the hacking group ‘The Guardians of Peace’ for their planned release of the film ‘The Interview’, in which Hollywood stars Seth Rogan and James Franco plan to assassinate North Korean leader Kim Jung-Un. The major media and electronics group were shown the power of the hackers when 47,000 records from employees were compromised, and several top upcoming film titles and trailers were released early. Read more

survival in the digital age

Cyber Security Misconceptions – Fact or Fiction?

When it comes to Cyber Security it is often difficult to keep up with what is fact and what is scaremongering. If Digital Security isn’t your core business then it makes sense to seek advice and find out once and for all whether the threats are actually real and whether you really should be investing in the new technology you’ve heard so much about. Read more

Cybercrime

Communication Security with Server Cloaking

The debate that began with the introduction of a new Investigatory Powers Bill in the Queen’s Speech earlier this year is still raging. It raises a number of questions about exactly how online communication and security is able to be maintained and protected when you consider the reduction in encryption that is being introduced. By providing virtual back doors across the digital world can you ever really have a secure network? And does unveiling the threats that encryption covers up outweigh the potential risks for personal data? The argument is likely to continue for some time. Read more

mobile devices

Mobile Security – How secure is yours?

The weaknesses in mobile device security are becoming more and more evident with every new app release and technological advance. A recent report estimated that 95% of all Android phones in use are vulnerable to attack. That is a staggering 950 million devices that enable cyber criminals to potentially seize your data and gain access to your networks. Read more

paparazzi image blog

Celebrity Hacks – What Lessons Can We Learn?

The relatively new phenomenon of ‘Fappening’ began last year with the release of private and mostly compromising pictures of some fairly prominent celebrities. Recent reports state that almost 600 celebrity iCloud accounts were hacked last year, with the alleged offender appearing to access each account over 3,000 times over a 12-month period. Read more