Latest

Cyber Security Industry Articles

Latest Cyber Security Information

ARTICLES

Find out the latest information posted about the Cyber Security Industry

THREAT REPORTS

Latest threat reports concerning the Cyber Security Industry

THREAT INFORMATION

Find out more about threats and what to do to protect yourself

Articles

Find out the latest information posed
about the Cyber Security Industry

Proficio Wins Prestigious UK Networking Computing Award

Proficio Wins Prestigious UK Networking Computing Award

London, UK – May 15, 2019 - Proficio, an award-winning managed security services provider (MSSP) delivering managed detection and response (MDR), has been named ‘UK Cloud Delivered Security Solution of the Year’ by Network Computing UK. The Network...

Guest Article: Being a Man in a Minority

Guest Article: Being a Man in a Minority

For years I have been fortunate enough to work for some great companies and brands with many great managers, but you soon realise from reviewing my career that I have always been in male dominated sectors (soccer/football, finance, cybersecurity and...

Is your Next Generation Firewall (NGFW) Retrospective?

Is your Next Generation Firewall (NGFW) Retrospective?

What happens if a user downloads a file from the internet and was classified to be benign or unknown as at the time of download based on the live security feed(s) your security appliance synchronizes with, even your sandbox did not see it to be malware...

Guest Post: BYOD – Pros, Cons and the Middle Ground

Guest Post: BYOD – Pros, Cons and the Middle Ground

Bring Your Own Device (BYOD) according to Wikipedia refers to the policy of permitting employees to bring personally owned devices such as laptops, tablets, and smart phones to their workplace, and use those devices to access privilege company information...

Protect Your Online Business Integrity Right Now

Protect Your Online Business Integrity Right Now

There are a lot of things that you are going to have to get right when it comes to running a modern business, and one of the biggest things to think about is your online business integrity. This means protecting the company’s digital presence, and doing as...

Training Your Employees For Better Cyber Safety

Training Your Employees For Better Cyber Safety

There’s a lot you can do to secure your business from threats; from protecting important information in your online cloud with the latest software to keeping an eye on employees as well as outsiders by installing surveillance cameras. Nonetheless, cyber attacks are...

4 Ways to Improve Your Online Business Security

4 Ways to Improve Your Online Business Security

Author bio: Fatmir Hyseni is the CMO of Kosbit, a global IT vendor for AT&T and a Strategic Advisor for Critogo, your own extended digital team offering professional feedback and assistance. As an award-winning Chartered Marketer, Fatmir contributes to several...

Threat Reports

Latest threat information posted from the Cyber Security Industry

FTSE 250 Companies Missing Cyber Security Basics

FTSE 250 Companies Missing Cyber Security Basics

Security researchers at Rapid7 have found that 88% of FTSE 250+ organisations, have insufficient anti-phishing defences (i.e. DMARC) in the public email configuration of their primary email domains.The finding is part of their third Industry Cyber-Exposure...

Unsecured Database Exposes Security Logs of Major Hotel Chains

Unsecured Database Exposes Security Logs of Major Hotel Chains

Security researchers have discovered an unsecured database that exposed the security logs - and therefore potential cyber security weaknesses - of major hotels managed by the Pyramid Hotel Group.Pyramid Hotel Group manages hotels in the US, Hawaii, the...

Online Services Suffer Hacks Exposing Customers Data

Online Services Suffer Hacks Exposing Customers Data

This week two popular online sites suffered hacks, exposing sensitive customer data.Flipboard, a popular news aggregation app, confirmed that it had seen unauthorised access to databases containing some users’ account information, including full names,...

TalkTalk Customer Details Found Online Following 2015 Data Breach

TalkTalk Customer Details Found Online Following 2015 Data Breach

The personal information of 4,545 TalkTalk customers, including bank details, have been found online following a data breach back in 2015.Viewers had contacted BBC’s Watchdog Live to raise concerns however TalkTalk, who had failed to inform the affected...

Millions of Devices hit by Cisco Bugs

Millions of Devices hit by Cisco Bugs

Two bugs affecting networks have been disclosed by Cisco this week. The first vulnerability is in the logic that handles access controls to one of the hardware components in Cisco’s proprietary Secure Boot implementation. The vulnerability could allow an...

Researchers Recognise MegaCortex Ransomware Spike

Researchers Recognise MegaCortex Ransomware Spike

Cyber security researchers at Sophos have reported a spike in a new ransomware named MegaCortex. The infection targets corporate networks and has reportedly affected customers worldwide, with victims in Italy, the United States, Canada, the Netherlands,...

New Laws Proposed to Strengthen IoT Devices

New Laws Proposed to Strengthen IoT Devices

New laws aimed at improving the security of millions of internet connected devices in our homes have been proposed by the Department for Digital, Culture, Media & Sport (DCMS). A consultation (which is now open) has been launched to help protect...

Password Risk List – Have You Strengthened Your Approach?

Password Risk List – Have You Strengthened Your Approach?

This list (which you can read in full here) shows the top 100,000 passwords that have been involved in global cyber breaches. We released this in collaboration with international web security expert Troy Hunt, as part of the Have I Been Pwned dataset. His...

Microsoft Confirms Email Hack

Microsoft Confirms Email Hack

Microsoft has confirmed that a hacker - or group of hackers - has broken into a customer support account for the company before gaining access to information related to customers’ email accounts.Hackers were reportedly able to access email content from a...

Third Parties Leak Data on 540 Million Facebook Users

Third Parties Leak Data on 540 Million Facebook Users

Researchers at security firm UpGuard have found a significant number of Facebook users’ records exposed on a public storage server.  According to the researchers, two batches of scraped user records were collected and exposed from two third-party...

Threat Information

Find out more information about what threats are and what you can do

Cyber Threats from Email

Cyber Threats from Email

If your computer is locked, and you are seeing a “Your computer has been locked” notification from a law enforcement agency then your computer is infected with a piece of malware

Spam & Phishing Scams Protection

Spam & Phishing Scams Protection

Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Identity Theft Cyber Attack Information

Identity Theft Cyber Attack Information

The number of people falling victim to identity theft in the UK has risen by almost a third, new figures suggest.  The BBC reported on 26th May 2015 that criminals are increasingly using internet forums to buy and sell data.  They use the information to open bank...

Security Threats in Cyber Cafés

Security Threats in Cyber Cafés

No matter how good the security or how much money is thrown at maintaining the integrity of systems, there is a fundamental flaw – people. Indeed, while I have no idea as to the origin of the quote – the reality is that you really are “only as strong as your …

Security Threats from USB Sticks

Security Threats from USB Sticks

The latest craze in computer storage, the thumb-sized USB drive, is so convenient and small that it’s become a fashionable accessory. The drives come on key fobs and in such novelty designs as Lego bricks or sushi. They’re given out at conventions and …

Some worrying Statistics

OVER
 

%

Detected Attacks

and 25% of Large Firms experience a breach at least once per month

 
ONLY
 

%

Suppliers

of all businesses set cyber security standards
for their suppliers

 
 
ONLY
 

%

Have Written

a formal written cyber security policy to protect their business

 
TOOK
 

%

Recommended Action

to identify risks
from Cyber Attacks

 

Stay Safe, Stay Sure, BE SECURE!

Cyber attacks are being performed every second of every day.

You must review your current Cyber defences and continue to have them tested by professional organisations.

View the CYBER ATTACK video

Sign Up for our Latest Posts

Share This

Share this post with your friends!