Latest

Cyber Security Industry Articles

Latest Cyber Security Information

ARTICLES

Find out the latest information posted about the Cyber Security Industry

THREAT REPORTS

Latest threat reports concerning the Cyber Security Industry

THREAT INFORMATION

Find out more about threats and what to do to protect yourself

Articles

Find out the latest information posed
about the Cyber Security Industry

What To Do When You’ve Been Attacked Online As A Business

What To Do When You’ve Been Attacked Online As A Business

Getting attacked via the internet as a business can be a terrifying moment. For some, viruses can appear with the black screen of death popping up and other times, you might see the actual attack on your computer happening in front of you. Here are some tips to help...

What You Can Learn from Last Year’s Largest Cyber Attacks

What You Can Learn from Last Year’s Largest Cyber Attacks

It’s almost halfway through 2020 and a lot of businesses have already been hit with major cyber attacks. A significant one being the London-based banking software provider Finastra, which suffered a ransomware attack in the middle of March.  The attackers swiftly...

Security By Design: How UX Keeps Your Website Users Safe

Security By Design: How UX Keeps Your Website Users Safe

You want to create a frictionless experience for your website’s visitors. You want to make it easy for them to access the information, products or features that matter to them. You want an intuitive experience that creates positive associations with your brand....

Cyber Security and Online Gaming

Cyber Security and Online Gaming

Around the world, millions upon millions of people play online games every day. Research suggests that in the UK alone, around 69% of adults would consider themselves a casual gamer, which equates to around 39 million people. Quite clearly, online gaming – be it via...

Data Privacy and Cybersecurity Issues in Mergers and Acquisitions

Data Privacy and Cybersecurity Issues in Mergers and Acquisitions

Several processes are involved in businesses and investments. However, Mergers and Acquisitions (M&A) stands out as one of the most popular business processes. Some other business processes include Initial Private Offering (IPO), Intellectual Property (IP), as...

UK SMEs Continue to Thrive Despite Fluctuating Revenues and Demand

UK SMEs Continue to Thrive Despite Fluctuating Revenues and Demand

Business is never easy. In the UK, the landscape is in a constant state of flux: new threats to revenue and stability can present themselves every day, and as soon as one is dealt with, another is ready to take its place. Bigger businesses are more able to take a few...

Threat Reports

Latest threat information posted from the Cyber Security Industry

F5 Security Devices Affected by Vulnerability

F5 Security Devices Affected by Vulnerability

The NCSC is aware of a remote code execution vulnerability affecting the F5 BIG-IP Traffic Management User Interface (CVE-2020-5902). Organisations affected by the vulnerability should follow vendor best-practice advice in the mitigation of vulnerabilities. In this...

F5 Security Devices Affected by Vulnerability

Unauthorised Data Sharing

A survey from data discovery and auditing software vendor Netwrix has revealed that inappropriate data sharing continues to be a problem for companies and businesses. The research shows that whilst most companies store their data in designated secure storage, there is...

F5 Security Devices Affected by Vulnerability

Action Fraud Reveals Cost of Online Fraud During Lockdown

A report from Action Fraud has revealed that over 16,000 people fell victim to online shopping and auction fraud during lockdown. The UK’s fraud and cyber crime reporting centre say that they have received reports of online shopping fraud totaling £16.6million in...

F5 Security Devices Affected by Vulnerability

Poor Password Practices

A recent study carried out by FICO Consumer Digital Banking, showed only 40% of people in the UK have separate passwords for their financial accounts. The research highlighted that just over 20% of UK citizens only use between 2-5 passwords, which are then re-used for...

F5 Security Devices Affected by Vulnerability

New HMRC Text Message Phishing Scam Targets Self-Employed

A new phishing scam, designed to steal personal and financial details from self-employed workers using the Self-Employment Income Support Scheme (SEISS), has been uncovered by litigation company Griffin Law. Victims are informed via SMS that they may be eligible for a...

F5 Security Devices Affected by Vulnerability

Exim Flaw Highlighted by NSA

The US National Security Agency has published an advisory this week relating to the ongoing exploitation of Exim vulnerability CVE-2019-10149. Russian military cyber actors, known as Sandworm, have been exploiting a vulnerability in Exim mail transfer agent. To...

F5 Security Devices Affected by Vulnerability

Older Versions of the QTS Operating System Vulnerable

Users of the QTS operating system have been urged to ensure it is updated to the latest version. A bug bounty report has found that QNAP NAS devices running older versions of the QTS operating system may be attacked through a number of vulnerabilities which, when...

F5 Security Devices Affected by Vulnerability

New Survey Highlights The State of Remote Working in the UK

A survey of 2,000 UK SME employees working from home in April has found that only 9% had checked whether their antivirus software had been updated. The findings from Avast Business also discovered that 18% are working from unprotected devices, and only 26% have access...

F5 Security Devices Affected by Vulnerability

Cyber Security Warning Issued to Organisations in the UK and USA

Security agencies in the UK and USA have issued advice to organisations involved in the coronavirus response, after it was revealed that they are being targeted by malicious cyber campaigns. The report, jointly published by the NCSC and the US Cybersecurity and...

Threat Information

Find out more information about what threats are and what you can do

Cyber Threats from Email

Cyber Threats from Email

If your computer is locked, and you are seeing a “Your computer has been locked” notification from a law enforcement agency then your computer is infected with a piece of malware

Spam & Phishing Scams Protection

Spam & Phishing Scams Protection

Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Identity Theft Cyber Attack Information

Identity Theft Cyber Attack Information

The number of people falling victim to identity theft in the UK has risen by almost a third, new figures suggest.  The BBC reported on 26th May 2015 that criminals are increasingly using internet forums to buy and sell data.  They use the information to open bank...

Security Threats in Cyber Cafés

Security Threats in Cyber Cafés

No matter how good the security or how much money is thrown at maintaining the integrity of systems, there is a fundamental flaw – people. Indeed, while I have no idea as to the origin of the quote – the reality is that you really are “only as strong as your …

Security Threats from USB Sticks

Security Threats from USB Sticks

The latest craze in computer storage, the thumb-sized USB drive, is so convenient and small that it’s become a fashionable accessory. The drives come on key fobs and in such novelty designs as Lego bricks or sushi. They’re given out at conventions and …

Some worrying Statistics

OVER
 

%

Detected Attacks

and 25% of Large Firms experience a breach at least once per month

 
ONLY
 

%

Suppliers

of all businesses set cyber security standards
for their suppliers

 
 
ONLY
 

%

Have Written

a formal written cyber security policy to protect their business

 
TOOK
 

%

Recommended Action

to identify risks
from Cyber Attacks

 

Stay Safe, Stay Sure, BE SECURE!

Cyber attacks are being performed every second of every day.

You must review your current Cyber defences and continue to have them tested by professional organisations.

View the CYBER ATTACK video

Sign Up for our Latest Posts

Share This

Share this post with your friends!