Most employees do not consider security issues when WFH
According to a new survey from VPNOverview.com, almost 70% of UK workers have given no thought to the cybersecurity implications of working from home. The survey quizzed 2043 employees across the UK and concluded that most were lacking in awareness of both the threats and their potential solutions. That means they could be putting their […]
Read MoreCredential theft attacks are soaring
The number of cyberattacks that resulted in large-scale credential thefts doubled between 2016 and 2020, according to a report by security vendor F5. Poor security practice, as well as an increase in people working remotely, is thought to be behind the increased number of attacks. Passwords stored as plaintext were deemed responsible for around 4 […]
Read MoreEmbrace the Cloud!
The Cloud has been around a while, but the events of the past year has seen the adoption of cloud-based technologies surge. Office shutdowns because of the pandemic forced a vast number of businesses to finally dip their toes into the water – and discovered it was warm. Out-workers of all kinds liked it too, […]
Read MoreHome-working is putting company systems and data at risk
The Coronavirus pandemic has caused a seismic shift in working practices with millions of employees being forced to work from home because their offices have been closed. Many will stay that way, because the economics and work patterns have changed permanently, but it is presenting companies with numerous issues – not least cybersecurity. There are […]
Read MoreGlobal demand for computers soars during pandemic
New figures for 2020 have revealed how the coronavirus has sharply revived the computer services market. After a decade of gradual decline, In the last three months of 2020, the global market for PCs was an enormous 25% higher than in the same period the previous year. Almost 100million units (excluding tablets) were purchased worldwide […]
Read MoreWhy text may not be the best choice for two-factor authentication
Many cyberattacks are carried out using stolen or weak credentials. Which is why the security industry is encouraging us to take more care of our logins by adding two-factor authentication (2FA). This means that after entering your password, you have to enter a verification code that’s sent to you via another device. There are a […]
Read MoreFacebook’s 2FA may be making you less private
As high profile data breaches and leaks continue to hit the headlines, more people are becoming aware of the benefits of two-factor authentication (2FA). This allows you to overcome the weaknesses of relying on just a password by having an authentication code sent to a mobile phone – either as a text or via an […]
Read MoreAre Chinese tech firms a threat to western security?
The future promised us by technology companies is one of smart cities wherein autonomous vehicles will negotiate with each other to find congestion-free routes; where public services such as health and energy provision will be managed efficiently through data; and where even our homes will be run by smart devices. Whether you think this represents […]
Read MoreUnified threat management – What is it and why does it matter?
The cyber threat landscape has become much more complex in recent years and that has made defending corporate networks far harder. Many companies are turning to a multi-layered approach, integrating several security technologies into a single security strategy. This may involve in-house installations and managed services. In order to manage this approach, unified threat management […]
Read MoreHow not to handle a data breach
It’s not often that a week goes by these days without a company revealing news of a data breach involving its customers. Partly this is down to the implementation of new legislation including GDPR which means breaches have to be made public within a specific timescale. But this doesn’t mean that companies are going about […]
Read More