123456 Most Popular Password, Web Users Risking Cyber Attacks

123456 Most Popular Password

The most popular password of 2015 have been labelled “dangerous” by security experts because of their simplicity. The list of logins, put together by password management firm SplashData from lists of stolen passwords that appeared online, showed that the combination “123456” remains the most popular password among web users, followed by “password”. IT Security experts […]

Why Cultural Values are Key to Security

Why Cultural Values are Key to Security

As Managing Director of Layer 8 Ltd, a security company dedicated to using conversations to change culture, I often find myself being asked what the ‘return’ would be on investing in security culture – lots of security professionals still see it as a nice ‘add-on’ but not a priority. My reply is always that a […]

Over 90 Percent of Android Devices Run Outdated Operating Systems

Android Devices Run Outdated Operating Systems

Research Paints Worrying Picture of State of Security of Mobile Devices in the Enterprise Duo Security, a cloud-based access security provider protecting the world’s largest and fastest-growing companies, has analysed data from its installed base of over 1 million mobile devices to discover over 90% of Android devices are running out-of-date versions of the Android […]

8 of the Largest Data Breaches of All Time

8 of the Largest Data Breaches of All Time

According to the ITRC (Identity Theft Resource Center), there have been 5,754 data breaches between November 2005 and November 2015 that have exposed 856,548,312 records. According to their data, there were 783 breaches in 2014, the largest number of data breaches in a single year to date. ITRC data also indicated that 29% of breaches […]

If you only Install One Security Update this Month, Make Sure it’s Adobe Flash!

If you only Install One Security Update this Month, Make Sure it’s Adobe Flash!

A zero-day vulnerability discovered in Adobe Flash Player / AIR 20 could possibly be used to exploit end of life version 19 – found on 78 percent of all private US PCs. Secunia Research at Flexera Software, a leading provider of software vulnerability intelligence, has published country reports covering Q4 2015 for 14 countries. The […]

Building a Network Infrastructure

Building a Network Infrastructure

This can be a rather complicated process for businesses to optimise, but if a solid plan is in place and is implemented accordingly, the system will perform to a level that will enable the company to form reliable communications networks for future growth. The graphic outlines the steps that need to be taken in building […]

Heating, Lighting and Physical Security Most Vulnerable Systems to Cyber Attack

Most Vulnerable Systems to Cyber Attack

QinetiQ whitepaper warns of overlooked vulnerabilities in building management systems The systems which control heating, lighting and security in most buildings are particularly vulnerable to cyber attack, a QinetiQ whitepaper has warned. In analysis undertaken in late 2015, QinetiQ found that these systems create a route for serious damage and disruption to be caused to […]