Guest Blog from CyberHive: The Legacy of the “SolarWinds” Hack: How do we protect against supply-chain cyber-attacks?
By Alan Platt, COO and Co-founder, CyberHive. Much information has been published already about the highly sophisticated “SolarWinds” cyberattack that was uncovered in December 2020. Attackers managed to access highly secure infrastructure in 18,000...
World Password Day 2021: Are Passwords Still the most Effective Security Measure?
The concept of a password has existed for millennia. And while the idea of them has remained the same, our use has not. A password no longer has to be a word, for example. But taking all into account, the password has remained very similar over the ages. That is now...
Cyber Security In Cars: Is It Something To Worry About?
Being future-ready means being aware of not just the most common security risks affecting individuals and organizations today, but those that might affect us tomorrow, as well. One threat that is becoming increasingly likely to rise is that of car-hacking. Here, we’re...
Learning to be Future-Ready
The world is rapidly changing before our eyes. Every year, new technological advancements are being announced as commercially available for the market's use. Thanks to the ingenuity of forward-thinking people, we get to experience evolution right before us. Technology...
Your Employees and Cybersecurity: What You Need to Know
Your employees will be your company’s greatest asset, but it’s also important to remember that, just like most other things related to your business, they can also be a liability. This is especially the case when it comes to your company’s cybersecurity. While it’s...
Financial Fraud & Cyber Security in 2021: How do you stay on top of the game?
The cyber threat landscape has shifted dramatically in the past 12 months. With the global cost of crime expected to reach a phenomenal $10.5 trillion annually by 2025 we are on course to witness the greatest transfer of economic wealth in history. The global pandemic...
Guest Blog by Dan Raywood: Doxing – The Legalities of Disclosing Personal Details
In the latest of guest blogs from Dan Raywood, the subject of doxing is covered, which is a topic that was raised in one of our recent #InfosecLunchHour meetings. Thank you Dan for providing such great insights again! We’ve all received a scam call, where the...
Guest Blog by Dan Raywood – Hiring: The Experience Dilemma
We are delighted to share Dan Raywood's first write up from one of the #InfosecLunchHour sessions a couple of weeks ago. The conversation veered around the concept of Cyber Essentials, and then the following week, on the issues of hiring, skills and experience.No...
Protect Your Business Against a Cyberattack
It is an unfortunate fact that many small businesses believe that they aren’t worth the time of a cybercriminal. Sadly, while not coming from a place of harm, this can be very harmful to small businesses. Luckily it is never too late for you to take care of your...
Guest Blog: The Impact of COVID-19 on Cyber Security
There is a tremendous change in the world since COVID-19 hit us. Our way of life has changed extremely and everything is affected. Cybersecurity also got a major hit by this virus as it unleashed the doors for cybercriminals. Mostly, everything is shifted online due...