Related Posts

  • Security
  • Jan

The Property Sector: Cyber crime’s next target?

Commercially, the property sector is one of the most lucrative industries in the world. But, what's

Read More
  • Security
  • Jan

Is your organisation exposed on the dark web?

Cyber security has been at the forefront of our conversations with most of our partners over the las

Read More
  • Security
  • Jan

The Indisputable Benefits of Cyber Security Awareness Training

It is difficult to overstate the extent of the challenge that small and medium enterprises face in m

Read More
  • Security
  • Jan

Crisis Management and Emergency Planning: Are you Fully Prepared?

The outbreak of COVID-19 has forced many businesses into a level of crisis and emergency response th

Read More
  • Security
  • Jan

10 Top Tips about Security Awareness for Businesses

Cyber security awareness training is a critical element that every business should take seriously. T

Read More
  • Security
  • Jan

Why More Cyber Security Experts Should be in the Boardroom in All Sectors

Cyber security has never been as vital as it is now. Companies, even the ones that pride themselves

Read More
  • Security
  • Jan

Cyber Security Within the Retail Sector – How to Ensure You Remain Secure

Modern consumers are increasingly concerned about the data they provide to online retailers and how

Read More
  • Security
  • Jan

The Rise of Social Engineering Attacks and Why You Must Be Vigilant

Cyber security threats of all kinds are on the rise, but as individuals and businesses become more a

Read More
  • Security
  • Jan

Why You Should Take Your Cyber Security Seriously

If it feels like you are seeing cyber security issues in the news almost every single day, it is bec

Read More
  • Security
  • Jan

Thanks for having us Legalex!

We recently spent a few days out of office to participate at Legalex Cyber Security Expo at the Lond

Read More
  • Security
  • Jan

Fifosys @ Legalex in 2018!

For the first time in 2018, Legal Cyber Security will be running within Legalex. Legal Cyber Securit

Read More
  • Security
  • Jan

Three basic steps to protect your data

Cyber Security Centre race to prepare for future cyber-attacks. How protected is your Data?

Read More
  • Security
  • Jan

Your business could face £17m fines for inadequate cyber security

UK Businesses could lose 4% of global turnover for negligence in modernizing their cyber security de

Read More
  • Security
  • Jan

Ransomware Worldwide - Who is at fault?

Ransomware spreads worldwide and the blame game is in full swing. Jeremy Hunt warned the NHS in 2016

Read More
  • Security
  • Jan

Preventing Ransomware is easier than removing it

Malicious software hit Britain’s National Health Service as well as companies in Russia, Spain, Ukra

Read More
  • Security
  • Jan

Can your business cope with a cyber attack?

If national institutions in the UK can so easily be hit by ransomware described by Marcus Hutchins a

Read More
  • Security
  • Jan

The Need for Offensive and Defensive IT support

Ransomware recently infiltrated universities, railway companies, car factories and government depart

Read More
  • Security
  • Jan

Hackers can Access your data

Online criminals access your IT Infrastructure with the use of problem solving skills. With every ha

Read More
  • Security
  • Jan

Be smart. Update your operating systems.

Like Predators watching hordes of prey for hours on end. They eye up the weak. Patiently waiting bef

Read More
  • Security
  • Jan

Are your remote workers putting your business at risk?

How often do your staff work remotely? How secure is their internet connection?

Read More
  • Security
  • Jan

5 simple ways you can mitigate social cyber threats

Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, do

Read More
  • Security
  • Jan

Automate the pain away - Automate your patch management with Fifosys!

Keeping up to date with the latest security patches for your end-user environment is of huge importa

Read More
  • Security
  • Jan

The importance of encryption

Smart decisions relating to privacy and security are made when decision maker's have a grasp of how

Read More
  • Security
  • Jan

Will GDPR change the way content censorship is regulated in the UK?

Internet censorship isn't exclusive to places in the middle and far east like Iran and China. It exi

Read More
  • Security
  • Jan

Hackers are attacking your WiFi - Here's how to protect yourself

The latest severe security vulnerability was made public yesterday. It’s crucial you’re all aware so

Read More
  • Security
  • Jan

Is the decision to weaken encryption too technical for those in power?

If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there i

Read More
  • Security
  • Jan

Here's what you need to know about the Dark Net

A dark net is the everyday term for an encrypted, superimposed internet network which can only be us

Read More
  • Security
  • Jan

How to tell if a website is trying to hack you

However, turning away from anything technical is turning a blind eye to the possibility you could be

Read More
  • Security
  • Jan

The way to protect your business from phishing attacks

Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinat

Read More
  • Security
  • Jan

People's browser's get hacked all the time.. Here's how they do it

Your adversaries in the cyber sphere pose threats to you and your business in many forms. They have

Read More
  • Security
  • Jan

Strategies cyber criminals use to access your data

Typically a form of malware which seeks to take control of your computer, stealthily encrypting your

Read More
  • Security
  • Jan

"So much malware, what do I do?"

Malware is the common term covering all malicous programs written with the intent of obtaining data

Read More
  • Security
  • Jan

As a business owner, are you aware if..

If your staff possess the know-how to protect your business from cyber criminals? If your systems ar

Read More
  • Security
  • Jan

Pivotal factors that weaken your security

Considering a hacker spends more time contemplating how to penetrate weakened systems and how to ide

Read More
  • Security
  • Jan

The Top 3 things you need to stay safe online

If any of the above were in your top 3 then I have news for you - you are NOT doing the best things

Read More
  • Security
  • Jan

Why you need cyber security - How hackers value your data

How hackers value your data Why would someone want to hack you? What is the point of a hacker taking

Read More
  • Security
  • Jan

Any web app can infect your computer - Here's how to avoid the pitfalls

Most people nowadays are equipped with some form of computing device - laptop, desktop, smartphone o

Read More
  • Security
  • Jan

3 Fundamentals of Security

Building a perimeter of anti-virus applications is not feasible in this digital era as many anti-vir

Read More
  • Security
  • Jan

Which Wins... Security, Privacy Or Anonymity? You decide!

These days, life is like a reality show for all of us. The surge in popularity of social media platf

Read More
  • Security
  • Jan

The Cyber Security Landscape - Understanding the Threats and Mitigating the Risk

If an IT company promises you 100% Security for your data with 0% risk - remember they're 100% takin

Read More
  • Security
  • Jan

The Cyber Security Landscape - To what degree is your business at risk?

It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never

Read More
  • Security
  • Jan

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More
  • Security
  • Jan

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More