For any business, the benefits of a robust information security plan go way beyond the IT department. But for a security plan to be effective, the co-operation of staff at all levels is essential. […]
Cyber security has been in the spotlight once again in 2016 so as the year draws to a close we take a look back at our past stories and wonder, have lessons been learned and will security be a priority in 2017?
The term ‘APT’ usually refers to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. It is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information. […]
The 2012 LinkedIn hack has been back in the news again recently after it was identified that the exposure of credentials leaked has increased from the previously reported 6.5million records to a substantial 117 million records. With a network of 433 million accounts this equates to 27% having been compromised. Needless to say if you haven’t yet changed your details it’s important to do so. […]
In February 2016, hackers hit the headlines again as news broke of a cyber attack on Bangladesh’s central bank. Specially crafted malware was used to hack into Bangladesh Bank’s SWIFT software, allowing the hackers to transfer $81 million from Bangladesh’s account at the Federal Reserve Bank of New York into accounts held at other banks, reportedly in the Philippines.
With so many potential demands on a limited Information Security budget, is Security Awareness training a good investment? It’s something that has been debated in companies for years and will be for years to come. […]
Cyber-extortion and blackmail are not new, but cyber-criminals have just about perfected their techniques of extracting money from the masses through the use of ransomware.
Businesses rely on data stored on their PCs, mobile devices and the cloud more and more each day – not necessarily important enough to make sure it is backed up reliably, but certainly enough to panic when criminals encrypt their data and then offer a decryption key at a price. […]