Do you know who’s been reading your email?

2018-08-03T14:51:44+00:00August 3rd, 2018|Categories: IT Security|Tags: , , , , , , |

Do you know who’s been reading your email? Recently, the Wall Street Journal ran an article about the fact that third-party app developers could gain access to your Gmail without you necessarily understanding the fact that you had authorised them to do so. The article was picked up by other news sources and [...]

What is social engineering?

2018-06-14T17:17:15+00:00June 14th, 2018|Categories: IT Security|Tags: |

What is social engineering in the context of digital security? The Guardian defines social engineering as “a non-technical strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices”. It involves breaking into digital security systems not with software but with talking to people, [...]

Cyber security innovation is overdue. What’s on the cards?

2018-06-08T10:06:50+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , |

Cybersecurity innovation is overdue. What’s on the cards? It’s not like the IT industry hasn’t tried, particularly the payment industry. Think back over the last 40 years or so (since IT began to go truly mainstream) and it’s easy to see that the IT industry, as a whole, has put a lot of effort [...]

The role of the NCSC in cyber security

2018-06-08T09:17:20+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , |

The role of the NCSC in cyber security The National Cyber Security Centre (NCSC) was officially opened in February 2017, although it had actually been operational since October 2016. It comes under the aegis of GCHQ and includes some existing GCHQ staff and has absorbed some staff from other government organisations, along with [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

Retail and cyber security

2018-05-15T10:53:51+00:00May 15th, 2018|Categories: IT Security|Tags: , |

Retail and cyber security As new research shows that the retail sector was targeted more than any other in cyber attacks in 2017, it is time for retailers to up their game when it comes to dealing with these organised attackers. The most common way to compromise retail systems was phishing and social engineering, [...]

Chinese criminals aim to exploit Android devices

2018-05-02T11:29:25+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

Chinese criminals aim to exploit Android devices Overall, the world has a lot of reasons to be grateful to Android. It has effectively brought capable smart devices within the budgets of people who either can’t afford or just don’t want to pay for iOS gadgets. It also has a lot of appeal to people [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Do you need a regular cybersecurity audit?

2018-05-02T10:51:45+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , |

Do you need a regular cybersecurity audit? Another week, another security breach, or at least that’s how it can seem sometimes. So far this week, we’ve had Hudson’s Bay, Panera and Under Armour all reporting data thefts. They are not the first companies to do so this year and while it would be nice [...]

Load More Posts