Yearly Archives: 2019

On the Blacklist

The National Cyber Security Centre says maintaining a password blacklist is an essential part of good password security.

We take a look at what should be on your blacklist and how to go about enforcing it.

Attention: How You’re Being Researched by Cyber Criminals

We might think we know about the perils of social media: distraction from real life, difficulty switching off, anxiety, FOMO (fear of missing out) and heightened stress.

But this misses perhaps the most dangerous peril: the use of the information you share by cyber criminals who want to target you.

What Can We Learn from the Eurofins Ransomware Case?

The largest private forensics provider in the UK has paid a ransom to hackers after its IT systems were compromised by a cyber-attack.

Is this the new normal? And what can businesses learn from the Eurofins experience?

The New Rules for Passwords in 2019

Access control is fundamental to security – whether in your home, your office or your IT infrastructure.

If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

Going to The Darkside?

The internet has become an integral part of most people’s lives to the point that it’s hard to imagine a time when it didn’t exist. In fact, over half of the World’s population now has access to the internet.

But did you realise there’s more than one internet? The Darknet is probably best described as the Wild-West of the internet and sits anonymously beneath the regular internet, and your credentials for apps or websites may be on there!

In this article, we look at guidelines on how to prevent this from happening.

Secure Yourself this Summer! How to Holiday with Peace of Mind

Summer is here! And if you’re about to jet off on holiday, IT security is probably the last thing on your mind. Thoughts of malware, spear-phishing and anti-virus are perhaps not as high on your agenda as sun, sea and sangria.

However, it’s important to heed the warnings and ensure that your high holiday spirit doesn’t leave you vulnerable to IT security concerns.

The Ever-Growing Attack Surface of IoT: Your Questions Answered

The impact of the Internet of Things is already making itself felt in our homes and in our everyday lives. This means an ever-growing threat for businesses as they try to keep pace with the new threats these devices present.

As the adoption of these connected devices grows, so does the attack surface we present to would-be hackers.

One Year On from GDPR: What’s Changed?

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. At the time it was heralded as a major change in the way individuals and organisations will think about – and collect, manage and secure – data.

GDPR was the “four letters that put the fear into firms’ hearts in 2018” according to the Register’s review of the year’s events. But was that fear justified?

One year on from the implementation of GDPR, we ask: what’s changed?

Doubling up: why two-factor authentication is your next step in digital security

As we continue to do even more online, the safety of our digital information has become as important as locking our front door. With all companies at seemingly equal risk of being targeted by cyber-attacks or data leaks, we are collectively doing more to protect our online information, both at work and at home.

So, if you want to add a way to protect your data even further, then it may well be time to enable two-factor authentication – also called two-step verification, or 2FA.