cyber security
-
May 2018
5 simple ways you can mitigate social cyber threats
Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, doxing and spam emails can be mitigated with security controls to protect you and your business. You can divide these security controls into two categories. The first is for an individual to adapt their… read more
-
April 2018
Is the decision to weaken encryption too technical for those in power?
Who knows.. maybe they get it. Maybe they don't. If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there is a great probability that political or financial motivations are higher priorities ahead of common sense and logic. Edward Snowden said "arguing you d… read more
-
April 2018
Are your remote workers putting your business at risk?
How often do your staff work remotely? How secure is their internet connection? In light of an article in computer weekly recently, more than half of UK businesses fear their mobile workers have been hacked and most are concerned a growing mobile workforce is equating to an increased cyber security… read more
-
March 2018
The importance of encryption
Smart decisions relating to privacy and security are made when decision maker's have a grasp of how encryption works. You don't need to be Einstein's gift to mathematics but knowing the fundamentals of encryption enables you to choose intelligently what crypto-systems are best suited for you and you… read more
-
March 2018
Automate the pain away - Automate your patch management with Fifosys!
Keeping up to date with the latest security patches for your end-user environment is of huge importance but can be inconvenient for busy business owners. It makes sense to automate the process to ensure your business is protected against vulnerabilities. Once you've applied the patches, your busines… read more
-
January 2018
Here's what you need to know about the Dark Net
The Dark Net is where hackers buy exploit kits from Dark Markets. A dark net is the everyday term for an encrypted, superimposed internet network which can only be used with specialist forms of software, authorisation, protocols and ports. The term ‘dark’ is used because it is not visible to you if … read more
-
January 2018
How to tell if a website is trying to hack you
Technophobes tend to bury their heads in the sand. However, turning away from anything technical is turning a blind eye to the possibility you could be directing a cyber criminal to your accounts. Don't worry though, this isn't rocket science. You don't need the mind of Tesla to get to grips with th… read more
-
January 2018
The way to protect your business from phishing attacks
Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinated attack. I'm not a fan of fear mongering, this is simply the business landscape of the digital age. As hackers' tools and processes become more sophisticated with time, the security infrastructure o… read more
-
December 2017
People's browser's get hacked all the time.. Here's how they do it
Your adversaries in the cyber sphere pose threats to you and your business in many forms. They have a number of ways to cut you in. Below are some strategies hackers will use access your systems: Spyware Collects information and sends it back to the attacker. Hackers are studying your behaviour at t… read more
-
December 2017
Strategies cyber criminals use to access your data
Here are a few strategies a hacker may use to attack your systems: Ransomware Typically a form of malware which seeks to take control of your computer, stealthily encrypting your files with an encryption key of which only a hacker knows. God forbid you find yourself in such a situation but if you do… read more