The Resurrection of Hacktivism

The effects of COVID-19 and political warfare have been rife with cyberattacks. From phishing emails offering tax refunds to doxxing medical sites, the widespread attacks have been seen across the world. But what about the other side of these negative attempts at stolen data? Along with the hacks for personal financial gain, recent events have also brought along a resurgence …

Why employees aren’t the weakest links in IT security

  It seems there is a modern perception across many industries that employees are the weakest links in IT security. And, Technology news website ‘The Next Web’ writes that “given the ever-increasing frequency of data breaches – with human error often being a cause or catalyst – you’d be forgiven for thinking that employees are naturally at fault.” With the …

Have you protected your business from Covid-19?

UK lockdown is moving swiftly towards its second month and, with no clear indication of when things might return to ‘normal’, businesses are settling into remote working for the long haul. No company was prepared for a pandemic, and many have already suffered major losses as a result of it. But it’s not too late to make sure your business, …

Notes from your Chief Security Officer

Currently Microsoft is spending billions each year on cybersecurity research and development. On top of this, Microsoft employs thousands of cybersecurity experts to constantly improve the speed, responsiveness, and strength of their security services. Then there’s the thousands of other people monitoring and neutralizing the threats and attacks spreading around the globe. Right now, the largest organizations in the world …

Cloud weaponization and Digital Security for a modern age

Cloud providers such as Microsoft Azure, Amazon and Google are perennial targets for attackers seeking to compromise and weaponize virtual machines and other resources.The digital age opens so many opportunities but also very serious threats. Once compromised the attacker can use these platforms to use these virtual machines to launch attacks, including brute force attacks against other virtual machines, to …

Hijacked Email Reply Chains

Although phishing has been around in various forms since the 1980s, it continues to evolve—and remains a major threat. These days, phishing tactics have become so sophisticated, it can be difficult to spot a scam—particularly in the case of hijacked email reply chains. Let’s look at a example using a concrete supplier.. Imagine you’re the purchaser for this concrete supplier, …

Cybercrime is on the rise

It is apparent to all that cybercrime is on the rise. The attacks in the last few years, Wannacry, Petya, and others have brought a new phrase – ‘Ransomware’ to our attention. The top three threats are as follows: 1. Malware – software designed to disrupt, damage, or gain unauthorised access to a computer system. Employee education, regular updates to …

What’s your security posture?

Security is a Board level concern. So how do you frame the big security questions in business terms? “What would happen if we were hacked and our ERP system was down for two days?” “What if a virus like notPetya locked us out of our computers and we couldn’t get ships in and out of the port?” “What if our …

What Types of Security Threats Do Small Businesses Face?

  Many criminals target small- to medium-sized businesses (SMBs) because simply they may not have the technological defences to protect themselves. A report from the Better Business Bureau shows that 87%of SMBs are aware that they are not safe from cybercrime. Despite this awareness, cyberattacks cost SMBs around £2 billion in 2017. This shows that smaller companies are still failing to secure their …