Latest

Cyber Security Industry Articles

Latest Cyber Security Information

ARTICLES

Find out the latest information posted about the Cyber Security Industry

THREAT REPORTS

Latest threat reports concerning the
Cyber Security Industry

THREAT INFORMATION

Find out more about what threats are and what to do to protect yourself

Articles

Find out the latest information posed
about the Cyber Security Industry

All Things Data for Your Small Business

All Things Data for Your Small Business

“Data”. You hear this word flung about a whole lot when you run a small business. But what actually does the word refer to? Well, data is just another way of saying “information” really. It is a collection of “facts” (such as numbers, words, measurements,...

Printing: An Invaluable Business Tool

Printing: An Invaluable Business Tool

When you run a small business, there are so many different areas that you need to take into consideration in order to make a success of your company. Of course, the majority of your focus is likely to lie in product development, market research, manufacturing, and...

Securing Your Business In The Modern Age

Securing Your Business In The Modern Age

Some businesses are so focused on being successful that they forget to stay grounded. It’s important that your company has safety nets in place to protect itself from threats on all levels. In the modern age, there are lots of tools available that can help to secure...

Threat Reports

Latest threat information posted from the Cyber Security Industry

Football or Phishing?

Football or Phishing?

At least two phishing campaigns are taking advantage of this year’s football World Cup. Fraudsters are attempting to exploit fans’ eagerness to keep up with the games and the results in the expectation that fans might click on links more readily. Phishing...

Owari Botnet Own-Goal Takeover

Owari Botnet Own-Goal Takeover

Owari botnet own-goal takeover Security researchers recently took over the large Owari botnet after its owner failed to change the command-and-control (C&C) server’s weak default credentials. Owari is a Mirai botnet variant, designed to exploit Internet of...

GDPR and Cyber Security

GDPR and Cyber Security

GDPR and what it means for cyber security The General Data Protection Regulation (GDPR) comes into force today, 25th May, setting clear instructions about the appropriate technical and organisational measures that must be in place to securely process personal data....

Cost of ransomware attack on Atlanta

Cost of ransomware attack on Atlanta

This report is drawn from recent open source reporting. Cost of ransomware attack on Atlanta As reported in the Weekly Threat Report of 6 April 2018, the US city of Atlanta recently fell victim to an attack by the SamSam ransomware, which exploits a vulnerability in...

Recent data breaches: GWR and Sodexo

Recent data breaches: GWR and Sodexo

Recent data breaches: GWR and Sodexo Great Western Rail has advised customers to change their passwords after unauthorised attempts to access GWR.com accounts. The attack likely used password data harvested from other areas of the internet. GWR confirmed that around...

Threat Information

Find out more information about what threats are and what you can do

Cyber Threats from Email

Cyber Threats from Email

If your computer is locked, and you are seeing a “Your computer has been locked” notification from a law enforcement agency then your computer is infected with a piece of malware

Spam & Phishing Scams Protection

Spam & Phishing Scams Protection

Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Identity Theft Cyber Attack Information

Identity Theft Cyber Attack Information

The number of people falling victim to identity theft in the UK has risen by almost a third, new figures suggest.  The BBC reported on 26th May 2015 that criminals are increasingly using internet forums to buy and sell data.  They use the information to open bank...

Security Threats in Cyber Cafés

Security Threats in Cyber Cafés

No matter how good the security or how much money is thrown at maintaining the integrity of systems, there is a fundamental flaw – people. Indeed, while I have no idea as to the origin of the quote – the reality is that you really are “only as strong as your …

Security Threats from USB Sticks

Security Threats from USB Sticks

The latest craze in computer storage, the thumb-sized USB drive, is so convenient and small that it’s become a fashionable accessory. The drives come on key fobs and in such novelty designs as Lego bricks or sushi. They’re given out at conventions and …

Some worrying Statistics

OVER
 

%

Detected Attacks

and 25% of Large Firms experience a breach at least once per month

 
ONLY
 

%

Suppliers

of all businesses set cyber security standards
for their suppliers

 
 
ONLY
 

%

Have Written

a formal written cyber security policy to protect their business

 
TOOK
 

%

Recommended Action

to identify risks
from Cyber Attacks

 

Stay Safe, Stay Sure, BE SECURE!

Cyber attacks are being performed every second of every day.

You must review your current Cyber defences and continue to have them tested by professional organisations.

 

 

View the NORSE attack map

View Cyber Attacks from NorseCorp

Sign Up for our Latest Posts

Share This

Share This

Share this post with your friends!