The recent global pandemic has brought a new wave of advancements to the technology industry. However, it has also brought along with it, some new problems – problems that only seem to be getting worse. While cybercrime continues to grow at an alarming rate, businesses in all sectors are facing a severe cybersecurity talent drought. […]
“Cyber criminals are operating at scale; If you’re the weakest member of the herd, you’re likely to be taken down first.”Security Bytes bring you all the latest cyber security know-how in bite sized chunks. “Cyber security user awareness training” Did you know your employees are the weakest link in your cyber security? Discover the importance […]
London, 22nd March 2016: Networking Plus Magazine – Information security is not keeping pace with growing risk, according to the Institute of Information Security Professionals (IISP).
In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences?
Few will have missed the largescale ransomware attack on 12th May 2017, particularly affecting the NHS, but disrupting operations at more than 100,000 organisations in 150 countries. If we didn’t yet fully comprehend the existing threat from ransomware, we now do – unfortunately.
Firms worldwide, major government departments and government infrastructure have been hit by yet another ransomware attack, affecting many European countries, particularly the Ukraine, but also in the Netherlands and the UK, amongst others – (as of Tuesday 27th June)
Threat Intelligence (CRITICAL UPDATE) Previously reported in 17 December 2019, a vulnerability has been identified in Citrix NetScaler ADC and Citrix Netscaler Gateway, which could allow an unauthenticated attacker to perform arbitrary code execution.
Whether your are self-employed, work for a small business, or indeed a large multi-national, for a while, working from home is going to become the new norm. Yet even in these challenging times, we’ve seen cyber criminals preying on people’s fears, using the Coronavirus as just another opportunity. For this reason, it is essential for […]
March 2020 Threat Intelligence (CRITICAL ALERT)
This is not meant to seem complicated, but firstly, to understand what Zscaler Private Access (ZPA) is, what it does… and why, it may be useful to understand a little bit about Zscaler Inc., courtesy of Wikipedia: “Zscaler is a cloud-based information security platform delivered through more than 100 global data centres. To use Zscaler, […]
February 2020 Threat Intelligence (CRITICAL ALERT)
Security experts have recently shared their predictions, warnings and best practices for the new year. 2020 promises a wave of technology development that will transform the industry and the lives of many people in IT in ways you won’t believe. In 2019, there certainly wasn’t a lack of damaging, publicised security breaches. And given the […]
In the past 10 years, the network has changed. And security has changed. Both consumers and businesses consume and utilise cloud services. We’re all mobile, utilising multiple devices from multiple locations. Which in turn kicked off an explosion of very real security risks. First coined in 2010 by an Analyst at Forrester Research Inc., a […]
Penetration testing is the cyber equivalent of letting someone break into your house and rummage through your drawers to see how easy it all would be to steal. Your valuables are in that house. Your underwear is in those drawers. It goes without saying that you don’t want just anyone barging through the door and […]
January 2020 Threat Intelligence (CRITICAL ALERT)
December 2019 Threat Intelligence (CRITICAL ALERT)
September 2019 Threat Intelligence (CRITICAL ALERT)
The unfortunate truth is that technology alone cannot protect you from cyber security attacks. You can have the best tools available, the most skilled security operations team, but… Unless you have an effective ‘cyber’ user awareness programme, your business will always be at risk. While it is unlikely (albeit possible) a disgruntled employee could cause […]
Your users are your biggest risk. With 90% of successful cyber attacks starting with a phishing email, the unfortunate truth is that technology alone can only do so much to protect you from cyber security attacks. Unless you have an effective user awareness programme, your business will always be vulnerable to attack. It’s an infrequent […]
It doesn’t matter whether you’re an end user or a business – it’s a difficult task to know how to improve your cyber security and defend yourself from threats you know exist but don’t fully understand! Yet, cyber criminals tend to draw on similar time-proven strategies, tactics and techniques to target infrastructures, network or personal […]
You can’t defend yourself from threats you don’t understand. While malware and phishing are fairly familiar terms, the mechanics of these types of cyber attacks is less well known. Understanding the method of delivery will help clarify the role of different security controls required to combat the common threats.
What do you think is the biggest cyber risk factor in your organisation? If your answer was your employees, you’d be right. The toughest security system on the planet can’t protect you if your staff are leaving the door wide open to cyber criminals. The process of using this weak link to access an organisation’s […]
Do you know who would be most likely to hack your information system? It’s quite possible you’ve never even thought of it. Determined attackers are constantly finding new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. There are many different types of attackers, each with their own reasons for […]