Taking the threat seriously is a major part of protecting your business.
It’s become something of running joke that workplace health and safety in this country has ‘gone mad’. Yes, there have been some decidedly odd decisions made in the name of injury prevention, but for the most part it’s just a myth. There are hundreds of thousands of workplace injuries every year, and health and safety rules help to keep that number down. We have these rules for the same reasons we nominate workers to be first aiders and fire marshals. What’s odd is that we don’t do the same for cyber security.Read More »
Yearly event to kick off next week.
Now in its second year, International Stress Awareness Week will run from 4th to 8th November 2019. During this week, the International Stress Management Association (ISMA) will hold a series of campaigns and events, including its annual conference, to raise awareness of workplace and personal stress and its effects on mental health.Read More »
Criminals won't go easy on them.
Only 9% of charities in the UK have a fraud awareness training programme, despite 69% of them regarding fraud as a major risk to their sector. So says a new report from the government, which shows the extent to which charities are vulnerable to fraud.Read More »
Aka: tales from the malicious script.
As well as being European Cyber Security Month, October is also the time when jack-o’-lanterns begin appearing on doorsteps and children roam from street to street, demanding confectionary from people they’ve probably never met before. Yes, it’s Halloween. And when it’s Halloween, it’s time for a scary story or two. Or in this case, four scary stories. About cyber security.Read More »
When partnering with a team of IT experts, it helps to choose one that will really deliver. Making a mistake can be expensive and time-consuming, whereas getting it right can boost productivity and enhance efficiency. Thankfully, there are three clear signs to look out for! Here’s a quick guide.Read More »
Spam, spam, spam, spam, spam, spam, spam, spam...
Today, we had the most wonderful bit of comment spam on our blog post ‘Is Someone Spying On Your Mobile Phone Calls?’. And when we say ‘wonderful’, we mean poorly written, completely unwelcome and destined for removal.Read More »
All change for the government's security certification programme.
Earlier this year, the NCSC (National Cyber Security Centre) announced that changes were coming to the Cyber Essentials scheme, one of which would be to reduce the number of accreditation bodies, from five down to one. The result of the competition has now been revealed, with the IASME Consortium set to take charge of Cyber Essentials from 1st April 2020.Read More »
If criminals can create their own reality, how can they be stopped?
Deepfakes, realistic counterfeit videos created by artificial intelligence, are being posted online in ever greater numbers, says a new report. In the last year, there has been a 100% increase in deepfakes on the web, and while the vast majority (96%) of them are pornographic in nature, this technology also poses a major security risk for businesses – because as deepfakes improve, their effectiveness as a means to commit fraud also gets better.Read More »
Some of the best things in life really are free.
Cyber security, like any form of security, often involves spending money. If, for example, you want CCTV, locks on your doors and a burglar alarm for your business premises, then you’ll have to pay for them. You can expect the same if you want anti-virus, a firewall and a backup system for your IT.
But there are some cyber security measures that cost nothing at all. These are simple actions that can make a real difference to your safety, without affecting your budget. Can they replace cyber security technology? No, but they can complement it and give your organisation an extra layer or protection.Read More »
Protect your precious data with backup and disaster recovery
In the case of most major cyber security attacks, recovery of data is the number one priority. Software can be reinstalled and hardware can be repaired or replaced, but data is often unique or extremely difficult to gather again.
This is why ransomware is such a frightening form of malware. In the short term, affected businesses will likely lose time and money due to downtime, as they scramble to get things up and running again, but it wouldn’t take long to wipe all your systems and start again.Read More »
Chances are you're still using one of these.
Most of the time, when a new technology comes out, it replaces whatever preceded it in a reasonable amount of time. CDs, for example, superseded floppy disks as a storage medium. And while there was a period in which people continued to find uses for those old floppies, the crossover wasn't overly long. CDs became the norm, then DVDs, then flash drives and then the cloud.
But some technologies just refuse to go away completely. Despite newer, better alernatives, they cling on for years. Here are just six of these hardy survivors.Read More »
One year since its introduction, many businesses remain jittery about GDPR. Even in the most compliant and careful of organisations, the complexity of the legislation has exposed many vulnerabilities. Today, we take a look at what disaster recovery planning means for GDPR, and how it can help to keep you on the right side of the law.Read More »