Password managers – do the benefits outweigh the risks?

2020-06-29T13:09:52+00:00June 29th, 2020|Categories: IT Security|Tags: , , , , , |

Password managers - do the benefits outweigh the risks? One of the ironies of our modern, digital lifestyle is that we are continually being urged to use a strong and unique password for every account we have, while also continually being offered the option to have this password saved for us so that we [...]

How to identify a phishing scam

2021-12-23T16:23:46+00:00June 29th, 2020|Categories: How To, IT Security|Tags: , , |

Phishing : How to identify Phishing Scams Phishing scams are scams in which fraudsters attempt to trick people into revealing personal security information. The fraudster can then monetise this in some way. Most phishing is done by email, through texts and phone calls may also be used. The bad news is that it [...]

With Backstory, you can scan your system for hackers

2020-06-26T07:58:14+00:00June 26th, 2020|Categories: IT Security, Technology Trends|Tags: , , , |

With Backstory, you can scan your system for hackers While films and TV programmes may give the impression that internet security work is glamorous, in reality, much of it is simply detail-orientated slog. Much of security simply consists of comparing and contrasting one or more sets of circumstances in order to spot differences [...]

Can mobile phones get viruses?

2020-06-24T17:35:38+00:00June 24th, 2020|Categories: IT Security|Tags: , , , , |

Can mobile phones get viruses? Mobile devices are one of the greatest conveniences of the 21st century but, as anyone familiar with security will know, convenience and security do not always go hand in hand. While they may, technically speaking, be largely resistant to viruses (malware that can replicate itself), they are very much [...]

What SMEs need to know about a massive rise in ransomware attacks

2020-06-22T12:12:27+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , |

What SMEs need to know about a massive rise in ransomware attacks The Malwarebytes’ Q1 2019 Cybercrime Tactics and Techniques report contains some eye-watering statistics, including the fact Q4 2018 to Q1 2019 saw business ransomware detections increase by no less than 195% and, taken over the course of the year, the increase was [...]

What you need to know about device drivers and IT security

2020-06-22T12:09:47+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , , |

What you need to know about device drivers and IT security The 2017 WannaCry attack provided a case study in the importance of keeping operating systems updated and many companies (large and small) found themselves hastily updating their updates policy in the light of this event. While it is, clearly, necessary to keep operating [...]

Universities shown to be excellent places to go phishing

2020-06-22T11:48:06+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , |

Universities shown to be excellent places to go phishing The UK is famous for the quality of its universities, which attract undergraduates, postgraduates and academics from around the world. It would appear, however, that when it comes to IT security, some of the staff at these institutions may not be as well-informed as you [...]

Facebook’s use of phone numbers rings alarm bells

2020-01-14T09:16:39+00:00January 14th, 2020|Categories: IT Security, Technology Trends|Tags: , , , , |

Facebook's use of phone numbers rings alarm bells As companies increasingly try to persuade their customers to use two-factor authentication for added security when they log into their accounts, some people are anxious about providing their phone number in case it is misused or divulged to the wrong people. Facebook, when it launched [...]

IoT home gadgets to be made more secure

2020-01-02T15:55:53+00:00January 2nd, 2020|Categories: IT Security, Technology Trends|Tags: , , , , |

IoT home gadgets to be made more secure The Internet of Things (IoT) has made our lives more convenient in all kinds of ways but, as anyone involved in security will know all too well, convenience can come at the expense of security. In some contexts, this does not really matter, but when [...]

Don’t lose out on contracts because of inadequate cyber security

2019-12-18T16:13:33+00:00December 18th, 2019|Categories: IT Security|Tags: , , , |

Don’t lose out on contracts because of inadequate cyber security Research from Beaming has shown that 31% of UK businesses would cancel contracts with their suppliers if they believed that those suppliers were affected by a cyber attack. The security of one network depends on the security of the networks around them, and [...]

Go to Top