Blog
DCMS Releases Cyber Security Breaches Survey 2020
The Cyber Security Breaches Survey 2020 provides many insights into the current state of cyber security. Blog by Hut Six Security
What is the Punishment for Breaking the Data Protection Act?
What is the Punishment for Breaking the Data Protection Act? Blog by Information Security Awareness Training provider Hut Six Security
How Cyber Criminals are Exploiting the Coronavirus
How Cyber Criminals are Exploiting the Coronavirus - From Critical Infrastructure to Leaked Video Conferences. Blog by Hut Six Security
Morrisons Found Not Liable for Insider Threat Breach
UK supermarket Morrisons found not guilty for insider threat data breach. Blog by information security awareness training provider Hut Six Security
What is a Phishing Text Message?
What is a phishing text message? "smishing" is still a significant threat. Blog by Information Security training provider Hut Six Security.
Cyber Criminals Always There to Exploit a Crisis
It has been reported that a significant cyber attack has been launched against the World Health Organisation. Information Security blog by Hut Six Security.
6 Business Critical Information Security Tips for SMEs
Information security tips to help safeguard any organisation. Blog by Information Security Awareness Training Provider Hut Six Security.
The Essential Anti-Phishing Training Guide for SMEs
What is phishing and how can you avoid it? The essential Anti-Phishing Training Guide from information security awareness platform Hut Six Security.
What to Do if you Don’t Have a Business Continuity Plan
In times of sudden change, be it a natural disaster, electronic failures or global pandemics, having a business continuity plan is essential. But what should you do if you don't have one?
Phishers Exploiting COVID-19 Coronavirus
Phishing attacks are using the COVID-19 Coronavirus as a means of attracting unsuspecting individuals. Information Security blog from Hut Six Security.
SME Security is No Picnic
SME Security is No Picnic: problem in Chair not in Computer. Information security blog by information security awareness training provider Hut Six Security.
How Does the Data Protection Act Affect Businesses?
How Does the Data Protection Act Affect Businesses? Rights, Obligations and Important Concepts. Blog by Hut Six Security.
Google Warning Over Huawei Devices
Google Warning Over Huawei Devices: Huawei concerns continue. - blog by Information Security Awareness Training provider Hut Six Security
How Much Compensation for Breach of Data Protection Act?
How Much Compensation for Breach of Data Protection Act? Your Data Rights and Right to Compensation. Blog by Hut Six Security.
What is Phishing? In Computer Technology - It’s a Number 1 Threat
Phishing is a number one cyber threat, and awareness training is required to ensure all employees realise it's a business-critical matter.