BLOG
Outbound Email Errors Cause 93% Increase in Breaches
IT leaders have suffered significantly higher numbers of data breaches as a result of outbound email in the last 12 months. According to research by Egress, 93% of 538 IT leaders surveyed [...]
Universities Face Increase in Ransomware Attacks as Students Return
Academia has faced fresh warnings of cyber-attacks after a rise was recorded in August when students returned. According to an alert issued by the National Cyber Security Centre (NCSC) there has been [...]
UK Businesses Planning for Long-Term Shift to Digital Working
Over half (56%) of UK businesses plan to increase their digital skills training budgets for staff next year, suggesting changes to working practices as a result of the COVID-19 [...]
39% of Employees Access Corporate Data on Personal Devices
A large proportion of employees are using their own devices to access data belonging to their company, according to a new study by Trend Micro. Researchers found that 39% of [...]
Gaming hardware giant Razer exposed customer data via misconfigured database
Global gaming hardware manufacturing company Razer leaked the personal information of around 100,000 customers by storing their data in an Elasticsearch cluster that was misconfigured to enable public access, [...]
Why security misconfiguration is higher during Covid-19
There are good reasons your IT security team may be looking a bit sleep-deprived. In addition to the stress of the Covid-19 pandemic everyone is facing, they’re also dealing [...]
Travel Sites Riddled with Hundreds of Vulnerabilities
Security researchers have discovered hundreds of vulnerabilities across major hotel and airline and travel booking websites, some of which have already suffered major breaches. UK-based consumer rights group Which? [...]
Almost a Quarter of UK Work Computers Lack Adequate Security Software
New research from Kaspersky has discovered that of the 32% of Brits provided with a corporate desktop computer, only 77% have adequate anti-virus or cybersecurity software installed, leaving 23% [...]
Cyber Essentials – The 5 Controls: Secure Configuration
Secure Configuration The second of the 5 controls - ‘Secure Configuration’- involves the application and maintenance of the most secure setting on all devices and software in your network. [...]
Cyber Essentials – The 5 Controls: Firewall
Firewalls Cyber Essentials requires that you safeguard all internet-connected devices with Firewall protection. Let’s explore this requirement in greater detail; we’ll look at the various types of Firewall and [...]
Cyber Essentials – Introduction
What is Cyber Essentials? Initiated in 2014, Cyber Essentials is a government-backed scheme implemented by the National Cyber Security Centre (NCSC), designed to guide businesses in the fundamentals of [...]