Almost everything you do on your phone could be accessed by hackers.
When we use our mobile phones, we do so with the expectation of privacy. Whether we’re making a call, sending a text or browsing the web, we assume we have full control over who can see or hear what we’re doing. But the reality is that someone could be listening in and you might never know.Read More »
Online connectivity brings a whole load of problems with it.
It’s an increasingly important part of business and daily life, but the Internet of Things is set to become a massive cyber security headache for businesses if more isn’t done to protect it from hackers.Read More »
Can you protect your business from invisible threats?
With cyber security, it’s generally true that the less that seems to be happening, the better. Sure, you can check in the security logs to see what your defences have been up to, and you can set up alerts to inform you when an attack has been halted. But if everything is quiet, then disaster hasn’t yet struck, and that can only be a good thing – at least that’s what you might think.Read More »
It may not be all it's cracked up to be.
Insurance is meant to provide peace of mind, but if you’ve ever had to make a claim, you’ll know just how tricky it can be sometimes. Of course, it differs from insurance company to insurance company, but in many cases, they’ll look for any technicality possible to avoid paying out.Read More »
Do you know your IT solutions as well as you should?
Visibility is one of the most important aspects of cyber security. Quite simply, if you can’t see what’s what, then you can’t do anything about it. You can’t spot weaknesses in your defences, and you can’t make improvements to better protect your business.
But what exactly do we mean by visibility, and how does it affect you?Read More »
Maintaining your defences is as important as setting them up to begin with.Read More »
Of the tiny number of criminals that are caught, a tiny number go to prison.
Despite a 90% conviction rate last year, cyber criminals in the UK largely avoided prison time. In fact, of all the crooks found guilty of computer misuse, only 16% were handed an immediate custodial sentence.Read More »
Stolen data is sold all the time online.
Imagine you’re a hacker and you’ve stolen a huge list of names and credit card numbers from one of your victims. You don’t want to commit financial fraud yourself, but you still want to make a profit. So you decide to sell the data. But you can’t exactly take a hard drive full of credit card details and account logins into your local pawn shop, so what do you do?
You sell it on the dark web.Read More »
Believing in the wrong things could be putting your business in harm’s way.
In the era of fake news and fake fake news, it’s never been more important to tackle myths and misinformation. That includes in the field of cyber security, where bad advice can have real, detrimental consequences for businesses.
Here are just seven cyber security myths that we think need to be debunked. We've also put together a handy infographic summarising this article – just scroll to the bottom of this post to view and download it.Read More »