security
-
May 2018
5 simple ways you can mitigate social cyber threats
Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, doxing and spam emails can be mitigated with security controls to protect you and your business. You can divide these security controls into two categories. The first is for an individual to adapt their… read more
-
April 2018
Is the decision to weaken encryption too technical for those in power?
Who knows.. maybe they get it. Maybe they don't. If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there is a great probability that political or financial motivations are higher priorities ahead of common sense and logic. Edward Snowden said "arguing you d… read more
-
April 2018
Are your remote workers putting your business at risk?
How often do your staff work remotely? How secure is their internet connection? In light of an article in computer weekly recently, more than half of UK businesses fear their mobile workers have been hacked and most are concerned a growing mobile workforce is equating to an increased cyber security… read more
-
April 2018
Thanks for having us Legalex!
We recently spent a few days out of office to participate at Legalex Cyber Security Expo at the London ExCel. Over two busy days, we greatly enjoyed ourselves. However, we sadly discovered a common theme among visitors. While many could explain they were backing up their data and were ‘all sorted in… read more
-
March 2018
The importance of encryption
Smart decisions relating to privacy and security are made when decision maker's have a grasp of how encryption works. You don't need to be Einstein's gift to mathematics but knowing the fundamentals of encryption enables you to choose intelligently what crypto-systems are best suited for you and you… read more
-
March 2018
Automate the pain away - Automate your patch management with Fifosys!
Keeping up to date with the latest security patches for your end-user environment is of huge importance but can be inconvenient for busy business owners. It makes sense to automate the process to ensure your business is protected against vulnerabilities. Once you've applied the patches, your busines… read more
-
January 2018
Here's what you need to know about the Dark Net
The Dark Net is where hackers buy exploit kits from Dark Markets. A dark net is the everyday term for an encrypted, superimposed internet network which can only be used with specialist forms of software, authorisation, protocols and ports. The term ‘dark’ is used because it is not visible to you if … read more
-
January 2018
How to tell if a website is trying to hack you
Technophobes tend to bury their heads in the sand. However, turning away from anything technical is turning a blind eye to the possibility you could be directing a cyber criminal to your accounts. Don't worry though, this isn't rocket science. You don't need the mind of Tesla to get to grips with th… read more
-
January 2018
Fifosys @ Legalex in 2018!
Legalex is the event for forward thinking, ambitious legal firms. For the first time in 2018, Legal Cyber Security will be running within Legalex. Legal Cyber Security Expo is the UK’s first exhibition and conference for the world of cyber security in the legal sector. Don't miss it! Running on the … read more
-
January 2018
The way to protect your business from phishing attacks
Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinated attack. I'm not a fan of fear mongering, this is simply the business landscape of the digital age. As hackers' tools and processes become more sophisticated with time, the security infrastructure o… read more