For any business, the benefits of a robust information security plan go way beyond the IT department. But for a security plan to be effective, the co-operation of staff at all levels is essential. […]
Cyber security has been in the spotlight once again in 2016 so as the year draws to a close we take a look back at our past stories and wonder, have lessons been learned and will security be a priority in 2017?
The term ‘APT’ usually refers to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. It is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information. […]
The 2012 LinkedIn hack has been back in the news again recently after it was identified that the exposure of credentials leaked has increased from the previously reported 6.5million records to a substantial 117 million records. With a network of 433 million accounts this equates to 27% having been compromised. Needless to say if you haven’t yet changed your details it’s important to do so. […]
Love it or hate it, social networking has firmly embedded itself into the fabric of our world. The likes of Facebook, Twitter and LinkedIn can be powerful business tools, especially for marketing, communication and recruitment purposes. […]
We’re pleased to announce that we’ve been selected as a Finalist in the Security Company of the Year category at the Computing Security Awards 2016! The winner will be decided by public vote so please visit Computing Security Awards and cast your vote for us now! Voting closes 5th October 2016.
In February 2016, hackers hit the headlines again as news broke of a cyber attack on Bangladesh’s central bank. Specially crafted malware was used to hack into Bangladesh Bank’s SWIFT software, allowing the hackers to transfer $81 million from Bangladesh’s account at the Federal Reserve Bank of New York into accounts held at other banks, reportedly in the Philippines.
When we think of IT systems and Industrial Control Systems (ICS) we tend to think that there is a vast difference in the way they are secured and managed but in reality there is little difference in the approach needed to secure the two separate system types.