Category: IT Security Expert Blog

Prevention is Better Than Cure: The Ransomware Evolution

This article has been indexed from IT Security Expert Blog Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware…

How Businesses Can Utilise Penetration Testing

This article has been indexed from IT Security Expert Blog Understand your security vulnerabilities Article by Beau Peters The basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among…

Payment Security: Understanding the Four Corner Model

This article has been indexed from IT Security Expert Blog Introduction Online shopping digital payment transactions may seem quite simple, but in reality, just one single transaction sets off multiple, long-chain reactions. The Payment Card Industry comprises debit cards, credit…

Cyber Security Roundup for July 2021

This article has been indexed from IT Security Expert Blog      A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, June 2021. How was UK Government…

Why Freelancers Should Prioritise Cybersecurity

This article has been indexed from IT Security Expert Blog Article by Beau Peters As a freelancer in any industry, you are likely more susceptible to hackers and cybercrime than many other professions. Not only are you pulling in a constant…

Top Cyber Security Challenges Post Lockdown

This article has been indexed from IT Security Expert Blog By Sam Jones | Cyber Tec Security Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine…

Top Cyber Security Challenges Post Lockdown

This article has been indexed from IT Security Expert Blog By Sam Jones | Cyber Tec Security Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine…

Cyber Security Roundup for June 2021

This article has been indexed from IT Security Expert Blog     A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2021. UK Smarties Cities Cybersecurity…

Cyber Security Roundup for June 2021

This article has been indexed from IT Security Expert Blog     A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2021. UK Smarties Cities Cybersecurity…

Keeping Phishing Simulations on Track

This article has been indexed from IT Security Expert Blog The West Midlands Train service has come under fire after workers discovered that an email promising them a bonus payment after running trains during the pandemic was actually a phishing…

Cyber Security: Data ‘Re’-Assurance

This article has been indexed from IT Security Expert Blog How do you know company data is secure?  How do organisations know their data is secure? And how can companies ensure that a network breach won’t result in a loss…

10 Things You Might Not Know About Cyber Essentials

This article has been indexed from IT Security Expert Blog   IASME delivers Cyber Essentials on behalf of UK NCSC By Sam Jones | Cyber Tec Security and Dave Whitelegg What is Cyber Essentials? If you are just hearing about the Cyber Essentials scheme, read…

10 Things You Might Not Know About Cyber Essentials

  IASME delivers Cyber Essentials on behalf of UK NCSC By Sam Jones | Cyber Tec Security and Dave Whitelegg What is Cyber Essentials? If you are just hearing about the Cyber Essentials scheme, read on as we unpack 10 things you might not know…

Cybersecurity Is Not A One-Stop-Shop

Cybersecurity is not a One-Stop-Shop Boris Johnson announced the Government’s roadmap to lift Coronavirus restrictions for both businesses and the general public earlier in February, and since then, this has provided a glimmer of hope for many across the country.…

Cyber Security Roundup for May 2021

Read the original article: Cyber Security Roundup for May 2021   < […]Content was cut in order to protect the source.Please visit the source for the rest of the article. Read the original article: Cyber Security Roundup for May 2021

Cyber Security Roundup for April 2021

Read the original article: Cyber Security Roundup for April 2021    A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, March 2021. How not to disclosure a…

Cybercrime to cost over $10 Trillion by 2025

Read the original article: Cybercrime to cost over $10 Trillion by 2025 Cyber attacks are a threat to businesses of all sizes and in all industries. With cybercrime rising by 600% during the pandemic, businesses are more vulnerable than ever…

Cybercrime to cost over $10 Trillion by 2025

Read the original article: Cybercrime to cost over $10 Trillion by 2025 Cyber attacks are a threat to businesses of all sizes and in all industries. With cybercrime rising by 600% during the pandemic, businesses are more vulnerable than ever…

HR Strategies to Drive Cybersecurity Culture in the New Normal

Read the original article: HR Strategies to Drive Cybersecurity Culture in the New Normal The COVID-19 pandemic has forced businesses across all industries to revise their working processes and requirements. From shifting overnight to a remote working model, furloughing staff…

Cyber Security Roundup for March 2021

Read the original article: Cyber Security Roundup for March 2021   A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, February 2021. Serious Linux Vulnerability Last month a…

Cyber Security Roundup for March 2021

Read the original article: Cyber Security Roundup for March 2021   A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, February 2021. Serious Linux Vulnerability Last month a…

Cyber Security Roundup for March 2021

Read the original article: Cyber Security Roundup for March 2021   A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, February 2021. Serious Linux Vulnerability Last month a…

The Ransomware Group Tactics which Maximise their Profitability

Read the original article: The Ransomware Group Tactics which Maximise their Profitability Article by Greg Foss, Senior Cyber Security Strategist, VMware Carbon Black Wherever there is disruption, cybercriminals see opportunity. Alongside the devastating health and economic impacts of the global…

Fintech Cybersecurity Trends in 2021

Read the original article: Fintech Cybersecurity Trends in 2021 Article by Beau Peters When the pandemic struck, online bad actors took it as an opportunity to double-down on their attacks through ransomware, malware, and social engineering. Newly remote workers and remotely…

The Linux Flaw you can’t afford to Ignore (CVE-2021-3156)

Read the original article: The Linux Flaw you can’t afford to Ignore (CVE-2021-3156) Linux and Unix operating systems require regular patching like any IT system, but as security professionals, ethical hackers, and criminal hackers will tell you, regular Linux and…

Cyber Security Roundup for February 2021

Read the original article: Cyber Security Roundup for February 2021 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, January 2021. Throughout January further details about the…

Data Loss Prevention: Artificial Intelligence vs. Human Insight

Read the original article: Data Loss Prevention: Artificial Intelligence vs. Human Insight The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even…

The Top Cybersecurity Certifications in 2021

Read the original article: The Top Cybersecurity Certifications in 2021 What are the Most Valued Cybersecurity Certifications in 2021? This is an important question for employers, recruiters, seasoned security professionals, and especially for those planning a cybersecurity career. The Information Security…

The Top Cybersecurity Certifications in 2021

Read the original article: The Top Cybersecurity Certifications in 2021 What are the Most Valued Cybersecurity Certifications in 2021? This is an important question for employers, recruiters, seasoned security professionals, and especially for those planning a cybersecurity career. The Information Security…

Cyber Security Roundup for January 2021

Read the original article: Cyber Security Roundup for January 2021 A suspected nation-state sophisticated cyber-attack of SolarWinds which led to the distribution of a tainted version the SolarWinds Orion network monitoring tool, compromising their customers, dominated the cyber headlines in…

Predicated Data Classification Trends for 2021

Read the original article: Predicated Data Classification Trends for 2021 Article by Adam Strange, Data Classification Specialist, HelpSystems In the digitally accelerated COVID-19 environment of 2021 what are the top data security trends that organisations are facing? Here is HelpSystems…

Cyber Security Roundup for December 2020

Read the original article: Cyber Security Roundup for December 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, November 2020. Manchester United FC remains impacted by…

The Multi-Million Pound Manchester United Hack

Read the original article: The Multi-Million Pound Manchester United Hack Earlier this year I wrote a blog post about the Manchester City Billion Pound Hack, which explored cyberattacks within elite football. Now it is the turn of City big rivals…

Advice: Protecting Lone Workers Through Covid Restrictions

Read the original article: Advice: Protecting Lone Workers Through Covid Restrictions Protecting lone workers is an issue that businesses may not have come across previously, especially those based in busy city centre office blocks pre-coronavirus. Yet with many thriving business…

Seven Debunked Myths of Cybersecurity

Read the original article: Seven Debunked Myths of Cybersecurity Article by Kristin Herman is a writer and editor at Ukwritings.com and Stateofwriting.com The term ‘cybersecurity’ has been tossed around lately. But although cybersecurity has been viewed as a saving grace…

Cyber Security Roundup for November 2020

Read the original article: Cyber Security Roundup for November 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, October 2020. London’s Hackney Borough Council has been…

Securing an Agile and Hybrid Workforce

Read the original article: Securing an Agile and Hybrid Workforce Guest article by Andrea Babbs, UK General Manager, VIPRE 2020 has forced businesses to revise many of their operations. One significant transition being the shift to a remote working model, for…

The DRaaS Data Protection Dilemma

Read the original article: The DRaaS Data Protection Dilemma Written by Sarah Doherty, Product Marketing Manager at iland Around the world, IT teams are struggling with choosing between less critical, but important tasks, versus focusing on innovative projects to help transform…

Top Five Most Infamous DDoS Attacks

Read the original article: Top Five Most Infamous DDoS Attacks Guest article by Adrian Taylor, Regional VP of Sales for A10 Networks  Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational…

Cyber Security Roundup for September 2020

Read the original article: Cyber Security Roundup for September 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, August 2020.Taking security training courses and passing certification…

Countering Cybercrime in the Next Normal

Read the original article: Countering Cybercrime in the Next Normal Guest post By Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon Black COVID-19 has reshaped the global cyberthreat landscape. While cyberattacks have been on the rise, the surge in frequency…

Beating the Emotet Malware with SSL Interception

Read the original article: Beating the Emotet Malware with SSL Interception Guest post by Adrian Taylor, Regional VP of Sales for A10 Networks   The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were…

Cyber Security Roundup for August 2020

Read the original article: Cyber Security Roundup for August 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, July 2020.The standout hack of July 2020, and…

Securing the COVID-19 ‘New Normal’ of Homeworking

Read the original article: Securing the COVID-19 ‘New Normal’ of Homeworking The COVID-19 pandemic has put into motion a scale of remote working never before seen. Our teams are no longer just grouped in different office locations – but working…

Securing the COVID-19 ‘New Normal’ of Homeworking

Read the original article: Securing the COVID-19 ‘New Normal’ of Homeworking The COVID-19 pandemic has put into motion a scale of remote working never before seen. Our teams are no longer just grouped in different office locations – but working…

Twitter Hack & Scam

Read the original article: Twitter Hack & Scam What Happened?Twitter confirmed 130 celebrity Twitter accounts were targeted in the cyberattack on Wednesday 15th July, with a  ‘small subset’ of those compromised. The hacked Twitter accounts included high profile individuals such as Barack…

Cyber Security Roundup for July 2020

Read the original article: Cyber Security Roundup for July 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, June 2020. Australian Prime Minister Scott Morrison announced…

Cyber Security Roundup for June 2020

Read the original article: Cyber Security Roundup for June 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2020. EasyJet’s disclosure of a “highly sophisticated…

Cyber Security Roundup for May 2020

Read the original article: Cyber Security Roundup for May 2020 A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, April 2020. As well reported, UK foreign exchange…

Security Threats Facing Modern Mobile Apps

Read the original article: Security Threats Facing Modern Mobile Apps We use mobile apps every day from a number of different developers, but do we ever stop to think about how much thought and effort went into the security of…

How to Keep Your Video Conferencing Meetings Secure

Read the original article: How to Keep Your Video Conferencing Meetings Secure Guest Post by By Tom Kellermann (Head Cybersecurity Strategist, VMware Carbon Black)The sudden and dramatic shift to a mobile workforce has thrust video conferencing into the global spotlight…

How to Keep Your Video Conferencing Meetings Secure

Read the complete article: How to Keep Your Video Conferencing Meetings Secure Guest Post by By Tom Kellermann (Head Cybersecurity Strategist, VMware Carbon Black)The sudden and dramatic shift to a mobile workforce has thrust video conferencing into the global spotlight…

Working from Home Cybersecurity Guidance

Guest post by Crossword Cybersecurity Working from home comes with a range of security risks, but employees need to be educated too – human behaviour is invariably the weakest link in a company’s cybersecurity posture. In the current environment, with…

Coronavirus Cybersecurity: Scams To Watch Out For

The Coronavirus pandemic has shocked the world in recent months, with many countries being forced to go into lockdown or encourage its nationals to self-isolate as much as possible. Many are trying to work out how to juggle working from…

Coronavirus Cybersecurity: Scams To Watch Out For

The Coronavirus pandemic has shocked the world in recent months, with many countries being forced to go into lockdown or encourage its nationals to self-isolate as much as possible. Many are trying to work out how to juggle working from…

Keys to the Kingdom, Smart Cities Security Concerns

By Sean Wray, VP NA Government Programs, Certes Networks Smart cities seem inevitable. According to IDC, Smart City initiatives attracted technology investments of more than £63 billion globally in 2018, and spending is estimated to grow to £122 billion in…

Securing Interactive Kiosks IoTs with the Paradox OS

Article by Bernard Parsons, CEO, Becrypt Whether it is an EPOS system at a fast food venue or large display system at a public transport hub, interactive kiosks are becoming popular and trusted conduits for transacting valuable data with customers.…