Data Protection

is information stored in the cloud secure

Is Information Stored in the Cloud Secure?

Is information stored in the cloud secure? It’s fair to say that 2019 was the year that cloud computing went mainstream, though despite many businesses willingness to migrate data away from local…


Chrome goes for Gold in Password Security blog image by Hut Six Security

Google Chrome Goes for Gold in Password Security

Google Chrome has now introduced a new feature that alerts users if any of their login credentials have been compromised in a data breach and will recommend when a password change is necessary.…


Windows 10 Security Flaw blog image

NSA Discloses Severe Windows 10 Security Flaw

The United States National Security Agency (NSA) has uncovered and exposed an extremely serious security flaw in Microsoft’s Windows 10 CryptoAPI service. Publicly announced by the intelligence…


Wifi safety blog image

Top 5 WiFi Safety Tips: The Guide to Staying Secure

The abundance of WiFi networks available to us is obviously massively useful; whether we’re out shopping, commuting or socialising, people are always looking for ways to stay connected. But the same…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


Information Security and compliance blog image

Information Security - Is it Just About Compliance?

Across all different industries, there is a significant portion of professionals that, despite assurances otherwise, look at both cyber security and information security as something of a business…


suspicious certificates blog image

Suspicious Certificates, Transparency and HTTPS

Will Certification Transparency Help to Rebuild Confidence in Certificate Authorities? With research suggesting an increasing trend towards SSL certified phishing websites (some up to 58%), users…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…


Surveillance economy blog post image

Human Rights and the Growing Surveillance Economy

Duopoly, Personal Data and the Tech Giants That Sell Your Secrets Amnesty International has released a damning report into surveillance-based business models and how this new field of data-driven…


HP's destructing firmware blog image

Attention: HP's Self-Destructing Firmware

Uptime Bug Risks Huge Data Loss for HP Customers The technology manufacturer Hewlett Packard has announced a firmware issue that could affect thousands of enterprise users. A series of solid-state…