cybersecurity

Blog / cybersecurity

The Impact of Corona Virus on Cyber Security

cybersecurity covid19   

The COVID-19 (Coronavirus) pandemic is spreading globally at an alarming rate, and along with disruption in global health, it is also causing damages to social, economic and political systems all over the world. Nearly the entire world workforce is now working remotely from homes, causing them to heavily rely on digital tools and remote means of communication. This has allowed cyber criminals to capitalize the situation and actively exploit the COVID-19 crisis.

Read More…

Using Organisational Culture to Improve Cyber Security

cybersecurity culture CISO   

We consistently recommend that you build a resilient business where cyber-security a priority. But what does organisational culture have to do with improving cyber-security? As most managers and CISOs know, one of the least static areas of business is cyber security. That’s because more than half of the fraud in the UK is conducted online. Therefore, in light of mounting attacks, it’s important to increase awareness at the company level. Plus, to ensure your cybersecurity policies are effective, you must get buy-in and action from all levels of staff.

Read More…

The State of Cyber Crime in the UK

crime cybersecurity   

Cyber-crime in the UK is on the rise. And the readiness of most firms to meet these challenges leave much to be desired for many local and regional businesses. In the UK alone, the Cabinet Office has estimated the cost of cyber-crimes on the economy at £27bn. At least an estimated £9.2bn of that is related to just the theft of IP from UK businesses. Companies bear the brunt of these financial losses.

Read More…

A live malware infection - a real life study (Part 1)

cybersecurity malware security   

We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.

Read More…

Topics

Featured

AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...