Blog Posts
New from Hut Six: Scenario-based branching Tutorials
One of the greatest challenges when developing a secure culture within the work force is ensuring that employees are able and confident in applying knowledge gained through training. How can you…
Micro-businesses are underestimating social engineering
Every day we see headlines dominated by big name corporates falling prey to cyber-attacks yet we rarely hear about Small Enterprise cases where the danger is just as great and the consequences…
Don’t let your Social Media be an open Book
Posting, sharing, liking and commenting have become a routine in our daily lives, but we must be careful what we are broadcasting and to whom… We share information online assuming that our posts…
Businesses are not taking GDPR seriously
437 days since GDPR legislation came into effect and the business landscape at ground level seems arguably unchanged. Sales teams across the world still call and email uninvited, protected by a…
General Data Protection Regulation
If you are a business owner, work in IT or handle customer or employee data there is a massive shake-up to data protection laws that you need to be aware of or risk unprecedented fines. For…
UK Government - a failure of attention and funding in cybersecurity?
The recent cybersecurity attack on NHS Scotland’s Lanarkshire trust has been confirmed to be the result of ever-prevalent ransomware. Ransomware is a type of cyber-attack where your files and data…
Passwords – Size Really Does Matter
63% of data breaches in Verizon’s Data Breach Investigation [1] were the result of bad password practice. This report analysed a dataset covering more than 100,000 incidents across 82 countries in…
Post Yahoo Hack – How can you defend your company?
Newsrooms around the world are finally coming to terms with the latest big hack, Yahoo, where a staggering 500 million accounts were compromised. If we simplify and assume each account was to…
Metrics - Be Clever, Tread Carefully
In any professional project it is necessary to outline the way in which we assess both failure and success. Selecting a series of metrics provides an easily quantifiable method to carry out this…
Information security awareness - not enough
It is a fact, universally acknowledged in the industry, that modern information security must turn its focus to the employees themselves to fully secure a business. Admittedly, some work has been…