Latest

Cyber Security Industry Articles

Latest Cyber Security Information

ARTICLES

Find out the latest information posted about the Cyber Security Industry

THREAT REPORTS

Latest threat reports concerning the Cyber Security Industry

THREAT INFORMATION

Find out more about threats and what to do to protect yourself

Articles

Find out the latest information posed
about the Cyber Security Industry

Your Employees and Cybersecurity: What You Need to Know

Your Employees and Cybersecurity: What You Need to Know

Your employees will be your company’s greatest asset, but it’s also important to remember that, just like most other things related to your business, they can also be a liability. This is especially the case when it comes to your company’s cybersecurity. While it’s...

How Does A Network Scan Tool Work?

How Does A Network Scan Tool Work?

Just like basic technology, internal networks are a part and parcel of everyday work. Be it your start up or an established business, you need a secure network that can support the sharing of files and other forms of data across desks within your office. Any form of...

Guest Blog by Dan Raywood – Hiring: The Experience Dilemma

Guest Blog by Dan Raywood – Hiring: The Experience Dilemma

We are delighted to share Dan Raywood's first write up from one of the #InfosecLunchHour sessions a couple of weeks ago. The conversation veered around the concept of Cyber Essentials, and then the following week, on the issues of hiring, skills and experience.No...

Why Cyber Security Is Important When Launching An Online Business

Why Cyber Security Is Important When Launching An Online Business

When you first launch your own company, you may feel as though you are not under any particular threats from cybersecurity. After all, you often hear about cyber attacks occurring at large, multinational companies instead of smaller businesses operating within their...

4 Things To Look For In A Great Security Firm

4 Things To Look For In A Great Security Firm

If you are considering hiring from a private security firm, there is much to consider. Security firms provide both physical and cyber security measures that can assist you on a personal level, or indeed for corporate security needs. Hiring from a security firm is a...

Data Privacy Day 2021: Industry Experts Discuss the State of Play

Data Privacy Day 2021: Industry Experts Discuss the State of Play

After one of the most tumultuous years in recent history, it’s necessary that we take the time to consider what data privacy means in the new context we find ourselves in. With more consumers relying on online services to do everything from their weekly shop to...

Combining Physical and Digital Security for Your Business

Combining Physical and Digital Security for Your Business

In the past, relying on physical locks and security features was the norm. After all, there was no such thing as digital lock systems and CCTV was rather primitive. These days, things are completely different and there are a whole new set of security needs due to...

Protect Your Business Against a Cyberattack

Protect Your Business Against a Cyberattack

It is an unfortunate fact that many small businesses believe that they aren’t worth the time of a cybercriminal.  Sadly, while not coming from a place of harm, this can be very harmful to small businesses.  Luckily it is never too late for you to take care of your...

Threat Reports

Latest threat information posted from the Cyber Security Industry

DNS Vulnerabilities Could Impact Millions of Devices Worldwide

DNS Vulnerabilities Could Impact Millions of Devices Worldwide

Cyber security researchers have uncovered a series of new DNS vulnerabilities which could impact more than 100 million internet connected devices worldwide. California based software company, Forescout, partnered with JSOF Research, disclosed nine vulnerabilities –...

Endpoint Security Pain Point for Cyber Professionals

Endpoint Security Pain Point for Cyber Professionals

A report conducted by Asavie has highlighted that Endpoint security has become the main pain point for businesses in 2020. Over 50% of the businesses surveyed stated that this was their main cybersecurity issue, followed by protecting against vulnerabilities, and...

Endpoint Security Pain Point for Cyber Professionals

Gamers Urged to Secure Online Accounts

Earlier this week, several media outlets reported an alleged data breach affecting more than 500,000 online gaming accounts. The reports, which video game publisher Activision has since said are inaccurate, claimed that Call of Duty players’ credentials had been...

Endpoint Security Pain Point for Cyber Professionals

NCSC Warns UK Academia of Rise in Number of Cyber Attacks

This week the NCSC issued an alert to support UK academia. Since the beginning of August, the NCSC has been investigating an increased number of ransomware attacks affecting education establishments in the UK, including schools, colleges, and universities. Ransomware...

Endpoint Security Pain Point for Cyber Professionals

Newcastle University Suffers a Serious Cyber Incident

Newcastle University confirmed this week that ongoing issues with its IT systems will take several weeks to address. Many of the university’s services are not operational and those that are may be taken down without notice. System issues first started last week and...

Threat Information

Find out more information about what threats are and what you can do

Cyber Threats from Email

Cyber Threats from Email

If your computer is locked, and you are seeing a “Your computer has been locked” notification from a law enforcement agency then your computer is infected with a piece of malware

Spam & Phishing Scams Protection

Spam & Phishing Scams Protection

Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Identity Theft Cyber Attack Information

Identity Theft Cyber Attack Information

The number of people falling victim to identity theft in the UK has risen by almost a third, new figures suggest.  The BBC reported on 26th May 2015 that criminals are increasingly using internet forums to buy and sell data.  They use the information to open bank...

Security Threats in Cyber Cafés

Security Threats in Cyber Cafés

No matter how good the security or how much money is thrown at maintaining the integrity of systems, there is a fundamental flaw – people. Indeed, while I have no idea as to the origin of the quote – the reality is that you really are “only as strong as your …

Security Threats from USB Sticks

Security Threats from USB Sticks

The latest craze in computer storage, the thumb-sized USB drive, is so convenient and small that it’s become a fashionable accessory. The drives come on key fobs and in such novelty designs as Lego bricks or sushi. They’re given out at conventions and …

Some worrying Statistics

OVER
 

%

Detected Attacks

and 25% of Large Firms experience a breach at least once per month

 
ONLY
 

%

Suppliers

of all businesses set cyber security standards
for their suppliers

 
 
ONLY
 

%

Have Written

a formal written cyber security policy to protect their business

 
TOOK
 

%

Recommended Action

to identify risks
from Cyber Attacks

 

Stay Safe, Stay Sure, BE SECURE!

Cyber attacks are being performed every second of every day.

You must review your current Cyber defences and continue to have them tested by professional organisations.

View the CYBER ATTACK video

Sign Up for our Latest Posts

Share This

Share this post with your friends!