Critical National Infrastructure is the backbone of the UK. Our quality of life as a nation depends on the prosperity of our NHS, the reliability of our electricity, water, and gas systems, and the ability of our emergency services to react with lightning speed when called upon. When compromised, it’s not just our economy that’s […]
There exists a classic example explaining the Modern Portfolio Theory (MPT) in finance. It goes thus: there are only two businesses on a small island, one selling umbrellas and the other sunglasses. On that island there are always, on average, 6 months of dry and wet season with profits of both companies depending on the […]
BACKGROUND: It has been reported that multiple police forces in the UK are warning WhatsApp users about scammers that could hijack their accounts. The scam involves security codes and has existed for a while but is rearing its head again. The old scam involves a message that’s seemingly from your friend. A usually hacker poses as a […]
Windows 11 will include the DNS-over-HTTPS privacy feature, which allows users to perform DNS lookups over an encrypted connection.
BACKGROUND: As reported by 9to5mac a second massive Linkedin breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. “The database is for sale on the dark web, with records including phone numbers, physical addresses, geolocation data, and inferred salaries. The hacker who obtained the data has […]
In this data-driven world, culpability and legislation are crucial. More crucial, and not to be overlooked, however, is that they fulfill their purpose – improving overall data privacy and security. As of May 2021, three years have passed since the inception of GDPR, Europe’s data privacy, and security law. Despite the flurry of activity that […]
There has been a jump in ransomware since the pandemic began and many businesses have either suffered from an attack themselves or know someone in their supply chain who has become a ransomware victim. Ransomware-as-a-Service is also a fast-emerging threat so we spoke to Sean Tickle, Head of CyberGuard Technologies, to learn whether companies should pay the demand […]
The Microsoft Threat Intelligence Center said it’s been tracking recent activity from Nobelium, a Russia-based hacking group best known for the SolarWinds cyberattack of December 2020, and that the group managed to use information gleaned from a Microsoft worker’s device in attacks. Microsoft said it “detected information-stealing malware on a machine belonging to one of […]
Following research by Which? that found three in five people received fake delivery company texts over the last year, Industry Leaders commented below.
Conceptualizing, developing, implementing, and maintaining an effective security program is a critical necessity for organizations to successfully achieve compliance with internal and regulatory controls. An effective security program is also paramount in an organization’s ability to meet contractual requirements with customers. Once initial compliance is achieved for the adopted, in-scope controls, the perpetual focus should […]