Modern businesses collect and hold onto more data than ever before, and this can range from internal company data, through to personal information about customers and even visual data collected through CCTV systems. However, this data also needs to be kept safe and secure at all times, and a failure to do so can severely hinder day-to-day operations. In this section, you will find blog posts providing valuable information about how to improve your safety measures, how to comply with data regulations like GDPR, and how to build greater awareness among your staff.
2022 is upon us. So it's perhaps fitting that we look at new starts and approaches. Given the last few years, one question we're asking is 'what's your cyber hygiene like?'
Global cyber attacks and information leaks have been on the rise, as hackers are becoming more and more sophisticated in their methods. Could the solution be blockchain?
There really is no escaping the internet or the need to be secure online these days, especially as we enter 2022. But is cyber security evolving into something more like risk management?
Andy Williams famously sang that Christmas is 'the most wonderful time of the year', but as we collectively shift online, could it be about to become one of the most dangerous?
Attacks are going to grow in frequency as threats evolve. Does this mean that the threat of cyber attacks is now too big of a job for governments and businesses to tackle alone?
On World Password Day, we take a look at some of the steps you should be taking to help secure your accounts, and your organisation, from the threat of cyber criminals.
Traditional anti-virus products have done a great job of protecting businesses in the past, however as the threats evolve, these traditional products can no longer offer the levels of protection required.
Commercially, the property sector is one of the most lucrative industries in the world. But, what's made cyber criminals sit up and take note of the sector?
Cyber security has been at the forefront of our conversations with most of our partners over the last 12 months. But, is your organisation exposed on the dark web?
Your adversaries in the cyber sphere pose threats to you and your business in many forms. They have a number of ways to cut you in. Below are some strategies hackers will use access your systems:
Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, doxing and spam emails can be mitigated with security controls to protect you and your business.
The latest severe security vulnerability was made public yesterday. It’s crucial you’re all aware so you can mitigate against the threat. This flaw is in the WPA 2 protocol used in encrypted Wi-Fi networks
How often do your staff work remotely? How secure is their internet connection?
Like Predators watching hordes of prey for hours on end. They eye up the weak. Patiently waiting before going in for the slaughter.
If national institutions in the UK can so easily be hit by ransomware described by Marcus Hutchins as “not as professional as...
Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinated attack. I'm not a fan of fear mongering,
A dark net is the everyday term for an encrypted, superimposed internet network which can only be used with specialist forms of software, authorisation, protocols and ports.
Keeping up to date with the latest security patches for your end-user environment is of huge importance but can be inconvenient for busy business owners.
Ransomware recently infiltrated universities, railway companies, car factories and government departments as well as the NHS.
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasingly critical to be safe online and to protect ones' personal privacy.
What business owners consider to be valuable assets will vary from one business owner to another but when all is said and done - it's all data.
If an IT company promises you 100% Security for your data with 0% risk - remember they're 100% taking you for a ride and they have 0% faith in what they're saying. First point of security - DO NOT let them near your assets!
Building a perimeter of anti-virus applications is not feasible in this digital era as many anti-virus apps are in fact loaded with malware. It has a friendly face then out of nowhere... POW! It does you in your unpatched vulnerability.
Most people nowadays are equipped with some form of computing device - laptop, desktop, smartphone or tablet. I'm willing to throw my two eggs at the wall and say 80% of those people..
How hackers value your data Why would someone want to hack you? What is the point of a hacker taking over your PC?
If any of the above were in your top 3 then I have news for you - you are NOT doing the best things to secure yourself online.
Considering a hacker spends more time contemplating how to penetrate weakened systems and how to identify them than the majority of people spend learning how to defend themselves against a cyber attack;
If your staff possess the know-how to protect your business from cyber criminals? If your systems are sophisticated in simplicity, yet multi-layered enough to protect your assets?
Malware is the common term covering all malicous programs written with the intent of obtaining data and corrupting a system.
Typically a form of malware which seeks to take control of your computer, stealthily encrypting your files with an encryption key of which only a hacker knows.
However, turning away from anything technical is turning a blind eye to the possibility you could be directing a cyber criminal to your accounts.
If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there is a great probability that political or financial...
Internet censorship isn't exclusive to places in the middle and far east like Iran and China. It exists in a myriad of variants in many places in the west as well.
Smart decisions relating to privacy and security are made when decision maker's have a grasp of how encryption works.
Online criminals access your IT Infrastructure with the use of problem solving skills. With every hacker is a unique solution to a problem. Unscrupulous their cause may be but hackers are creative intelligent people.
Malicious software hit Britain’s National Health Service as well as companies in Russia, Spain, Ukraine and Taiwan.
Ransomware spreads worldwide and the blame game is in full swing. Jeremy Hunt warned the NHS in 2016 they were failing to prioritise cybersecurity by continuing to use obsolete computer systems.
UK Businesses could lose 4% of global turnover for negligence in modernizing their cyber security defences.
UK Government proposes fines of £17 million for businesses ....
Cyber Security Centre race to prepare for future cyber-attacks. How protected is your Data?
For the first time in 2018, Legal Cyber Security will be running within Legalex. Legal Cyber Security Expo is the UK’s first exhibition and conference
Security is a daunting word. However, security is of paramount importance for any business.
We recently spent a few days out of office to participate at Legalex Cyber Security Expo at the London ExCel.
If it feels like you are seeing cyber security issues in the news almost every single day, it is because you almost certainly are.
Cyber security threats of all kinds are on the rise, but as individuals and businesses become more aware of the various dangers, those with malicious intent are coming up with increasingly sophisticated methods.
Modern consumers are increasingly concerned about the data they provide to online retailers and how it is handled, with issues ranging from GDPR compliance
Cyber security has never been as vital as it is now. Companies, even the ones that pride themselves on great security, have been victims of all kinds of cybercrimes.
When sourcing small business IT support, you will realise that there lies a difference between the main services available.
Cyber security awareness training is a critical element that every business should take seriously. The digital landscape provides commercial enterprises...
It is difficult to overstate the extent of the challenge that small and medium enterprises face in maintaining cyber security.
You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should lead you to a more defined choice of security controls.
It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never updated your security patches, you could be considered a threat to the future of your business...
These days, life is like a reality show for all of us. The surge in popularity of social media platforms has resulted in a parrallel rise in a variety of threats to our personal security
The outbreak of COVID-19 has forced many businesses into a level of crisis and emergency response that few have ever experienced or contemplated.
I’m sure you know yourself. You know your business. Of course you want to protect everything in it, right?