Blog Posts

Hut Six Security blog image new branching tutorial feature

New from Hut Six: Scenario-based branching Tutorials

One of the greatest challenges when developing a secure culture within the work force is ensuring that employees are able and confident in applying knowledge gained through training. How can you…


Hut Six Security social engineering image

Micro-businesses are underestimating social engineering

Every day we see headlines dominated by big name corporates falling prey to cyber-attacks yet we rarely hear about Small Enterprise cases where the danger is just as great and the consequences…


Hut Six Security social media blog image

Don’t let your Social Media be an open Book

Posting, sharing, liking and commenting have become a routine in our daily lives, but we must be careful what we are broadcasting and to whom… We share information online assuming that our posts…


Hut six security GDPR blog image

Businesses are not taking GDPR seriously

437 days since GDPR legislation came into effect and the business landscape at ground level seems arguably unchanged. Sales teams across the world still call and email uninvited, protected by a…


GDPR blog image by Hut Six Security

General Data Protection Regulation

If you are a business owner, work in IT or handle customer or employee data there is a massive shake-up to data protection laws that you need to be aware of or risk unprecedented fines. For…


Government cybersecurity blog image by Hut Six Security

UK Government - a failure of attention and funding in cybersecurity?

The recent cybersecurity attack on NHS Scotland’s Lanarkshire trust has been confirmed to be the result of ever-prevalent ransomware. Ransomware is a type of cyber-attack where your files and data…


Password size blog image by Hut Six Security

Passwords – Size Really Does Matter

63% of data breaches in Verizon’s Data Breach Investigation [1] were the result of bad password practice. This report analysed a dataset covering more than 100,000 incidents across 82 countries in…


Yahoo hack blog image by Hut Six Security

Post Yahoo Hack – How can you defend your company?

Newsrooms around the world are finally coming to terms with the latest big hack, Yahoo, where a staggering 500 million accounts were compromised. If we simplify and assume each account was to…


Metrics blog image by Hut Six Security

Metrics - Be Clever, Tread Carefully

In any professional project it is necessary to outline the way in which we assess both failure and success. Selecting a series of metrics provides an easily quantifiable method to carry out this…


Information security blog image by Hut Six Security

Information security awareness - not enough

It is a fact, universally acknowledged in the industry, that modern information security must turn its focus to the employees themselves to fully secure a business. Admittedly, some work has been…