The Internet of Things (IoT) isn’t just limited to the home or the office, connected devices are increasingly being used throughout Industrial Control Systems. The Industrial Internet of Things (IIoT), as it’s being called, is growing and is bringing a new world of connectivity to traditionally isolated ICS networks.
Posted on 4th April 2018
Posted on 27th March 2018
Have you ever pressed the ‘remind me later’ button when asked to update your software?
Of course you have – we all do it.
Whether it’s because we’re in the middle of something important or because we just can’t be bothered, it’s an increasingly dangerous attitude to have.
Posted on 26th March 2018
The threat of cyber-attack is increasing by the day and businesses across the world need to be aware that it’s quickly become a case of ‘when’ not ‘if’ an attack will happen.
When it comes to attack routes most people will be aware of the issues that surround weak passwords and the dangers of phishing attacks. But are you thinking about the more unusual techniques these threat actors utilise when considering your security?
Posted on 18th March 2018
Cyber-attacks are increasing in scale and impact – you only have to look back at the news headlines WannaCry made last year to see that this is the case.
Posted on 12th March 2018
SMS phishing, or smishing as it’s become known, has been hitting the headlines over the last few years and we are seeing various different techniques being used in an effort to obtain people’s valuable information. But what is smishing, how has it been done in the past and how do you ensure you don’t get caught out? Let’s take a look.
Posted on 6th March 2018
KFC keep their secret recipe in a safe which is monitored by video and motion surveillance 24 hours a day, Coca-Cola keep theirs in a secure metal box inside a high tech vault, Jasper Newton ‘Jack’ Daniel kept his whiskey recipe in a safe so secure he kicked it in frustration one day, developed gangrene and died. It’s debatable whether these tales are actually true, or just marketing spin, but whatever the reality it highlights the importance of your critical information and the need to keep it secure.
Posted on 26th February 2018
2017 was the year ransomware went global. Even if you haven’t heard the name WannaCry you’ll have certainly heard about the attack, it’s the one that affected NHS systems and brought disruption to the organisation for a number of days.
Posted on 16th February 2018
Cyber Defence Exercise, or CDX for short, is the annual cyber warfare simulation for aspiring IT experts still studying at university. Started in 2015 and now in its fourth iteration, the event attracts around 150 students to secure and defend purpose built infrastructure accordingly to a set theme.
Posted on 12th February 2018
Technology solutions are everywhere. Want something to eat but don’t want to move from the sofa, just use an app, want to share that holiday snap with all your friends, no problem there’s social media, don’t know how to do something around the house, there's an online video tutorial for that.
Posted on 8th February 2018
When you picture a cyber-attack what do you see? A hacker using sophisticated techniques to break into a multinational corporation, an attacker trying to gain access to a secretive government agency, state sponsored hackers trying to bring down national infrastructure?