Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Andy Harcup
VP EMEAfeature_status*/ ?>
Absolute Software

Comments Dotted : 9
November 23, 2020

Experts Reacted On MPs Hit With Nearly 3 Million Malicious Emails Every Month

Members of Parliament have been under added pressure over the last year.
Members of Parliament have been under added pressure over the last year, as the coronavirus continues to disrupt services, society and cause havoc for the general public. As a result, cyber attackers have attempted to infiltrate some of the most confidential data imaginable, governmental data, by overloading MPs with malicious phishing, scam or malware attacks, in an attempt to use times of national crisis to their advantage. Unfortunately, working from home has made it much harder to combat.....Read More
Members of Parliament have been under added pressure over the last year, as the coronavirus continues to disrupt services, society and cause havoc for the general public. As a result, cyber attackers have attempted to infiltrate some of the most confidential data imaginable, governmental data, by overloading MPs with malicious phishing, scam or malware attacks, in an attempt to use times of national crisis to their advantage. Unfortunately, working from home has made it much harder to combat this growing threat, and governmental departments must seriously consider adopting robust end point security which enables full visibility, control and access to an entire network of dispersed endpoints. This would mean a central IT manager could ensure public sector devices are kept as secure as possible, from anywhere in the country.  Read Less
Like(0)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Members of Parliament have been under added pressure over the last year...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-mps-hit-with-nearly-3-million-malicious-emails-every-month

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Members of Parliament have been under added pressure over the last year...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-mps-hit-with-nearly-3-million-malicious-emails-every-month

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 09, 2020

Open University Bombarded By Over 1 Million Email Attacks In 2020 – Experts Reaction

millions will be looking towards the Open University in an effort to boost qualifications, retrain in a new career path
As the second national lockdown puts more people out of work, and hinders ‘traditional’ education institutions, millions will be looking towards the Open University in an effort to boost qualifications, retrain in a new career path, or learn a new skill. Therefore, unfortunately, cyber attackers will attempt to target the onslaught of new personal devices which will soon be added to the Open University’s nationwide network of devices, all of which are likely to be connected, in some way,.....Read More
As the second national lockdown puts more people out of work, and hinders ‘traditional’ education institutions, millions will be looking towards the Open University in an effort to boost qualifications, retrain in a new career path, or learn a new skill. Therefore, unfortunately, cyber attackers will attempt to target the onslaught of new personal devices which will soon be added to the Open University’s nationwide network of devices, all of which are likely to be connected, in some way, via shared data storage points and cloud SaaS applications, for example. Therefore, prospective students, and the Open University itself, must ensure that its devices are protected by a sophisticated endpoint security solution, which will ensure that a compromised device can still be accessed, controlled or frozen, so that breached log-in credentials or a stolen device, does not necessarily equate to a loss of data.  Read Less
Like(1)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"millions will be looking towards the Open University in an effort to boost qualifications, retrain in a new career path..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/open-university-bombarded-by-over-1-million-email-attacks-in-2020-experts-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"millions will be looking towards the Open University in an effort to boost qualifications, retrain in a new career path..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/open-university-bombarded-by-over-1-million-email-attacks-in-2020-experts-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 27, 2020

Experts Reaction On ‘Council Tax Reduction’ Email scam Sweeps The UK

Regardless of the quantity of security training and software put in place, data will always be at risk from a sophisticated cyber attack.
Since the start of Covid-19, the cyber threat facing adults in the UK has surged, and this latest attack is one of many which have been designed to prey on individuals’ vulnerability and fear during this trying time. In particular, hundreds of email phishing campaigns have targeted corporations and businesses, with malicious attackers standing ready to take advantage of naïve or distracted employees, or exploit gaps in security controls. Regardless of the quantity of security training and.....Read More
Since the start of Covid-19, the cyber threat facing adults in the UK has surged, and this latest attack is one of many which have been designed to prey on individuals’ vulnerability and fear during this trying time. In particular, hundreds of email phishing campaigns have targeted corporations and businesses, with malicious attackers standing ready to take advantage of naïve or distracted employees, or exploit gaps in security controls. Regardless of the quantity of security training and software put in place, data will always be at risk from a sophisticated cyber attack, and therefore, it’s essential that CISOs take steps to quickly pinpoint potential threats and neutralise any cyber breaches as and when they occur, with effective and resilient endpoint security. This should equip organisations with the ability to communicate, control and repair remote devices beyond corporate networks as well as measure the health of security control apps and productivity tools, so that remote workers can safely stay productive.  Read Less
Like(0)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Regardless of the quantity of security training and software put in place, data will always be at risk from a sophisticated cyber attack...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-council-tax-reduction-email-scam-sweeps-the-uk

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Regardless of the quantity of security training and software put in place, data will always be at risk from a sophisticated cyber attack...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-council-tax-reduction-email-scam-sweeps-the-uk

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
June 09, 2020

Experts On News: Hackers Targeting Self-employed With HMRC SMS Phishing Scam

It is vital that users remain vigilant to such attacks, checking the origin and legitimacy of sites before handing over confidential financial data.
It’s no surprise that hackers are trying to cash-in on the Covid-19 outbreak, with increasingly opportunistic and sophisticated phishing scams framed around HMRC support programmes. This particular scheme is designed to trick unsuspecting self-employed workers into claiming a tax refund, at a time when many people are struggling to make ends meet. The scam uses official government branding, logos and layouts, including a disclaimer about the site using cookies to fool users into thinking this .....Read More
It’s no surprise that hackers are trying to cash-in on the Covid-19 outbreak, with increasingly opportunistic and sophisticated phishing scams framed around HMRC support programmes. This particular scheme is designed to trick unsuspecting self-employed workers into claiming a tax refund, at a time when many people are struggling to make ends meet. The scam uses official government branding, logos and layouts, including a disclaimer about the site using cookies to fool users into thinking this is a legitimate way to reclaim money. It is vital that users remain vigilant to such attacks, checking the origin and legitimacy of sites before handing over confidential financial data. It’s also critical that companies ensure they have the necessary cyber security systems in place to protect against malicious communications across all workplace laptops and devices, to keep hackers at bay.  Read Less
Like(9)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"It is vital that users remain vigilant to such attacks, checking the origin and legitimacy of sites before handing over confidential financial data. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-news-hackers-targeting-self-employed-with-hmrc-sms-phishing-scam

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"It is vital that users remain vigilant to such attacks, checking the origin and legitimacy of sites before handing over confidential financial data. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-news-hackers-targeting-self-employed-with-hmrc-sms-phishing-scam

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
May 24, 2020

UK airline easyJet data breach impacts 9M customers – expert commentary

Ensuring an attack of this scale does not happen again requires a concerted effort across all levels of an organisation.
Cyber criminals are opportunistic and immoral, and have increasingly targeted large, small and medium-sized organisations with a plethora of sophisticated scams, malware, phishing and hacking attacks, hoping to capitalise on their weakened state as a result of COVID-19. Unfortunately, the influx of new and personally-owned devices into an ever-increasing remote workforce has expanded the window of opportunity for cyber attackers – providing them with a much larger range of devices and.....Read More
Cyber criminals are opportunistic and immoral, and have increasingly targeted large, small and medium-sized organisations with a plethora of sophisticated scams, malware, phishing and hacking attacks, hoping to capitalise on their weakened state as a result of COVID-19. Unfortunately, the influx of new and personally-owned devices into an ever-increasing remote workforce has expanded the window of opportunity for cyber attackers – providing them with a much larger range of devices and untrained remote workers to target. Ensuring an attack of this scale does not happen again requires a concerted effort across all levels of an organisation. This starts with implementing comprehensive and resilient endpoint security which enables IT managers to remotely identify, secure or disable any potentially vulnerable devices belonging to their organisation, whether or not they are connected to the corporate network, all from the safety of their own home.  Read Less
Like(0)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ensuring an attack of this scale does not happen again requires a concerted effort across all levels of an organisation. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ensuring an attack of this scale does not happen again requires a concerted effort across all levels of an organisation. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 17, 2020

UK Anti-Doping Agency Hit With Over 11,000 Malicious Email Attacks – Expert Reaction

Addressing this problem requires all organisations to embrace a resilience-first approach to cyber security.
These figures are a reminder of the cyber security hurdles faced by athletics and sports organisations tasked with managing confidential data of high-profile individuals. Many of these agencies require staff members to travel regularly, meaning mobile devices like laptops and tablets are a top target for hackers and opportunistic thieves. Addressing this problem requires all organisations to embrace a resilience-first approach to cyber security. This means making critical apps self-healing.....Read More
These figures are a reminder of the cyber security hurdles faced by athletics and sports organisations tasked with managing confidential data of high-profile individuals. Many of these agencies require staff members to travel regularly, meaning mobile devices like laptops and tablets are a top target for hackers and opportunistic thieves. Addressing this problem requires all organisations to embrace a resilience-first approach to cyber security. This means making critical apps self-healing and gathering insights to remedy end-point vulnerabilities, so that hackers are kept locked out. Additionally, having the ability to track, freeze and wipe lost devices will guarantee that lost or stolen devices containing highly confidential data is protected at all times, in all circumstances.  Read Less
Like(11)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Addressing this problem requires all organisations to embrace a resilience-first approach to cyber security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-anti-doping-agency-hit-with-over-11000-malicious-email-attacks-expert-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Addressing this problem requires all organisations to embrace a resilience-first approach to cyber security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-anti-doping-agency-hit-with-over-11000-malicious-email-attacks-expert-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 14, 2020

Security Experts Analysis Of FBI Crime Report

The reason portable devices are major targets is that they are full of personal and financial information.
These figures reinforce the fact that cyber-crime is a lucrative business worth billion, a statistic that will only encourage an increase in illegal activity in the long-term. Despite these troubling headlines, many businesses are still not getting the message about the risk posed by hackers, who are seeking to exploit security vulnerabilities in all areas of organisations. Increasingly, mobile devices used by workers on the move are a target for cyber-criminals, and the sheer amount of.....Read More
These figures reinforce the fact that cyber-crime is a lucrative business worth billion, a statistic that will only encourage an increase in illegal activity in the long-term. Despite these troubling headlines, many businesses are still not getting the message about the risk posed by hackers, who are seeking to exploit security vulnerabilities in all areas of organisations. Increasingly, mobile devices used by workers on the move are a target for cyber-criminals, and the sheer amount of mobile threats is growing much faster than it did for PCs. The reason portable devices are major targets is that they are full of personal and financial information. For example, most devices have banking features backed up inside that are rich pickings for hackers. Cyber criminals are always hunting for security weaknesses in businesses, so it is crucial that those vulnerabilities are spotted and remediated by automated cyber security technology. All organisations must put resilience at the heart of every security strategy, to boost the cyber immune system through self-healing endpoint security systems and keep criminals locked out.”  Read Less
Like(0)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The reason portable devices are major targets is that they are full of personal and financial information...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-analysis-of-fbi-crime-report

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The reason portable devices are major targets is that they are full of personal and financial information...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-analysis-of-fbi-crime-report

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 20, 2020

Experts On News: London Councils Lose 1,300 Laptops, Mobiles And Tablets

With flexible working on the rise, opportunistic thieves will always be on the lookout for misplaced laptops and mobiles.
With flexible working on the rise, opportunistic thieves will always be on the lookout for misplaced laptops and mobiles, the majority of which could contain confidential public sector data. If said device ends up in the wrong hands, these councils and the constituents they serve could be facing severe consequences, including a major data breach with citizen details finding their way onto the dark web. It's time for all organisations to wake up to the very real risks posed by stolen devices.....Read More
With flexible working on the rise, opportunistic thieves will always be on the lookout for misplaced laptops and mobiles, the majority of which could contain confidential public sector data. If said device ends up in the wrong hands, these councils and the constituents they serve could be facing severe consequences, including a major data breach with citizen details finding their way onto the dark web. It's time for all organisations to wake up to the very real risks posed by stolen devices in terms of data security. Every single council should have robust end-point security measures in place to ensure that devices reported missing can be accessed, tracked, deleted and frozen appropriately.  Read Less
Like(1)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"With flexible working on the rise, opportunistic thieves will always be on the lookout for misplaced laptops and mobiles...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-news-london-councils-lose-1300-laptops-mobiles-and-tablets

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"With flexible working on the rise, opportunistic thieves will always be on the lookout for misplaced laptops and mobiles...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-news-london-councils-lose-1300-laptops-mobiles-and-tablets

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 20, 2019

Expert On News: Police Device Losses Surge By 150% Over Last 3 Years

Everyone recognises the loss of laptops and mobiles in the line of duty is inevitable.
The reality is that the majority of these devices will contain sensitive data on police investigations as well as confidential information about criminals, suspects and victims. Everyone recognises the loss of laptops and mobiles in the line of duty is inevitable, so it’s vital that forces have the necessary systems in place to track and freeze equipment when it falls into the wrong hands. This approach can help improve cyber security standards, protect the privacy of individuals and prevent.....Read More
The reality is that the majority of these devices will contain sensitive data on police investigations as well as confidential information about criminals, suspects and victims. Everyone recognises the loss of laptops and mobiles in the line of duty is inevitable, so it’s vital that forces have the necessary systems in place to track and freeze equipment when it falls into the wrong hands. This approach can help improve cyber security standards, protect the privacy of individuals and prevent criminals and opportunistic thieves from misusing police devices and stealing data.  Read Less
Like(0)  (0)

Linkedin Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Everyone recognises the loss of laptops and mobiles in the line of duty is inevitable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-news-police-device-losses-surge-by-150-over-last-3-years

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Andy Harcup, VP EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Everyone recognises the loss of laptops and mobiles in the line of duty is inevitable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-news-police-device-losses-surge-by-150-over-last-3-years

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel