Why you should never store your credentials in your browser
As many as three million people use browser extensions that maliciously take their data.
Continue ReadingAs many as three million people use browser extensions that maliciously take their data.
Continue ReadingPeople don’t see why they need a password manager to store a few passwords for all their accounts nor know the risks associated with poor password hygiene. Clearly, there is a need for effective education if more people are to adopt these tools.
Continue ReadingMicrosoft 365 is now a widely used cloud-based suite with over a million companies worldwide taking advantage of its productivity-enhancing capabilities.
Continue ReadingThere are three key points to making an opportunity “good”:
1. Your prospective clients need what you can provide.
2. Your prospective clients can afford what you can provide.
3. The service / product is something that you can provide competitively whilst making money.
You are faced with a choice: you can either stick to your current business model, accept your lot, and get ready to tighten your belt: or you double-down, work out other income streams and try to more than make up for your reduced core business.
Continue ReadingIt would seem that cyber criminals are rather opportunistic by nature and have seen the chaos that the pandemic has left in its wake as a chance to get a better return upon their “investments”, and have expanded operations and increased their efforts accordingly.
Continue ReadingBluedog Office 365 Monitoring – Protecting Office 365 from Malicious Attacks The advice from the government is to work from home where we can. This brings security challenges and hackers will make...
Continue Reading“May you live in interesting times” is an English expression which purports to be a translation of a traditional Chinese curse. While seemingly a blessing,...
Continue ReadingAt the time of writing this the official figures for confirmed Coronavirus cases is 45,204; 4,985 people have recovered and 1,116 have died. These are...
Continue Reading“Well, I don’t think there is any question about it. It can only be attributable to human error. This sort of thing has cropped up...
Continue ReadingAngus Shaw In March 2018 Travelex managed to leak around 17,000 people’s data. These unfortunate data subjects were all Tesco Bank customers; the data leaked...
Continue ReadingChloe Schofield Someone asked me a question at a cybersecurity seminar recently. “What do you think has been the single biggest change to the business...
Continue Reading“Firewalls and endpoint protection which SMBs have traditionally relied on are no longer adequate as experienced hackers can easily find ways round them.” – Tim...
Continue ReadingFirst of all, I would like to introduce myself to those of you reading this who may not know who I am. My name is...
Continue ReadingMustafa Kasim of Palmer’s Green recently became the first person to be sent to prison following an investigation by the Information Commissioner’s Office (ICO). Kasim...
Continue ReadingThe news of British Airways’ massive data breaches and the equally massive fines from the ICO are a clear sign of what is to come...
Continue ReadingThere are two things in the media a lot these days: Which companies have been hacked and the GDPR impact as a result of these...
Continue ReadingAs you have probably seen recently, Heathrow Airport recently had a data breach in the form of a USB stick that had been lost somewhere...
Continue ReadingFacebook doesn’t seem to get into the news for anything good. From Cambridge Analytica and election engineering through to how it targets its users in...
Continue ReadingFor those of you who know me, whether in a business environment or in a personal capacity, you will know that I am very passionate...
Continue ReadingThe latest in the evolution of malware specifically targets the Telecom Sector and wreaks about as much havoc as you would expect in these interesting...
Continue ReadingWe have all heard the phrase “the security landscape is always changing”, yet so many of us still believe that technology alone can protect our...
Continue ReadingWithin GCHQ, there is a division called the National Cyber Security Centre (NCSC). Given that GCHQ is the UK equivalent of the NSA, you can...
Continue ReadingHave you ever wondered where the bad guys that use ransomware and other malicious code actually get it all from? The options are pretty limited:...
Continue ReadingWe all know that there exists some kind of computer thing that we don’t want called ransomware. We also know that there is a complicated...
Continue ReadingOther than a vague feeling that cloud computing is the future, do you really know why your next server should be cloud-based? Sure, it is...
Continue ReadingAs a business, you have a choice of two different ways to teach your staff about Phishing. One of them will be VERY expensive. Phish...
Continue ReadingSecuring your client’s network against their staff OK, let’s be honest about this, this article is all about how Heimdal Security has the power to...
Continue ReadingHow to train your staff how to spot Phishing emails You’ve worked hard, and you have your IT security pretty well locked down: your network...
Continue ReadingIn the dry, legal jargon used in the text of the Data Protection Bill (the UK’s enactment of GDPR): “…the controller or the processor must,...
Continue ReadingWhy training is needed: Training is key to GDPR as if your staff doesn’t know and understand how to work in a compliant way, then...
Continue ReadingBack when people did not really understand much of the world around them, a lot believed that carrying a rabbit’s foot would bring them good...
Continue Reading2016, early last year, was declared the ‘year of ransomware’. At the time, it saw the largest growth in ransomware attacks the world had ever...
Continue ReadingUnless you live under a rock, for those of us who operate in The Channel, you will be aware of the hugely successful hack carried...
Continue ReadingBrigantia has always ensured that we are supplying our partners with the highest level of cyber protection possible and this has led to the development...
Continue ReadingNo doubt you’ve read the recent news that NHS services across England have been hit by a large-scale cyberattack and they have elected to protect...
Continue Reading