All Blog Posts

How Secure is your Password Process?

How Secure is Your Password Process?

Understanding What Makes a Strong Password On average, each of us uses approximately 13 unique passwords across all our accounts. To some this may sound like a lot, though research shows that many…


Who Does the Data Protection Act Apply to? Blog

Who Does the Data Protection Act Apply To?

And How Does It Affect Businesses? After many years of development and its introduction in 2016, both the EU’s General Data Protection Regulation and the UK’s Data Protection Act were formally…


Infosec Round-Up Ep#6 blog image

InfoSec Round-Up: June 5th 2020

https://www.youtube.com/watch?v=dKJkvBwxCuk This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the world of…


Social Engineering Methods blog Image

Social Engineering Methods

4 Ways Criminals Exploit Human Behaviour In 2016, a member of a Google research team conducted a social engineering experiment. Scattering 300 USB drives across a university campus, they found…


What Year Was the Data Protection Act Introduced? Blog image

What Year Was the Data Protection Act Introduced?

Data Protection – Who, What, Where, When and Why? What Year Was the Data Protection Act Introduced? The last several years have seen substantial changes in the area of data protection, perhaps…


InfoSec Round-Up: May 29th 2020

https://youtu.be/TdmQvJwkltI Episode #5 – 29th May This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the…


How Does the Data Protection Act Protect your Rights? blog image

How Does the Data Protection Act Protect your Rights?

The Seven Principles of the DPA Updating the Data Protection Act (DPA) 1998, the 2018 legislation of the same name incorporated the Europe-wide standards laid forth by the General Data Protection…


How a Ransomware Attack Works

How a Ransomware Attack Works

4 Essentials for Protecting Against Ransomware Knowing how a ransomware attack works can be the difference between the organisation falling victim to an attack, and detecting and acting on…


Handling Sensitive Information blog image

Hut Six Staff Snippets: Handling Sensitive Information

https://youtu.be/__q2o6OoaF8 In Hut Six Staff Snippets, our team take you through their favourite tutorials from our Information Security Awareness Training. Here Luke, our Head of Marketing…


InfoSec news blog image

InfoSec Round-Up: May 22nd 2020

https://youtu.be/a-qCfWUqI3k This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the world of information…