Information Security

Wold Health Organisation Cyber Attack blog image

Cyber Criminals Always There to Exploit a Crisis

Hacker Group Attacks World Health Organisation Following a warning released by the World Health Organisation (W.H.O) earlier this month regarding phishing emails, it has since been reported that a…


Insider Threat Sentenced to Two Years blog image

Insider Threat Sentenced to Two Years

A Chinese national has been sentenced to two years in prison for the theft of American owned trade secrets worth a reported $1 billion. A US court found Hongjin Tan, 36, guilty of theft of trade…


Six Business Critical Information Security Tips blog image

6 Business Critical Information Security Tips for SMEs

Regardless of whether you’re part of an international corporation or an up-and-coming SME, information security should be considered an integral part of not only IT, but as critical to management…


The Essential Anti-Phishing guide for SMEs blog image Hut Six Security

The Essential Anti-Phishing Training Guide for SMEs

Information Security Basics When considering the basics of information and cyber security, it’s sometimes tempting to think that we are in the group that are ‘too smart’ to be fooled by anything…


business continuity plan blog image

What to Do if you Don’t Have a Business Continuity Plan

Business as Usual? In times of sudden change, be it a natural disaster, electronic failures or global pandemics, having a business continuity plan is essential for an organisation determined to…


Phishers Exploiting COVID-19 Coronavirus blog image

Phishers Exploiting COVID-19 Coronavirus

Protecting yourself from Malware, Ransomware and More With the amount of global coronavirus infections passing 90,000, there is no shortage of opportunists, scammers and criminals lining up to…


Security is no picnic blog image

SME Security is No Picnic

Problem in Chair Not in Computer There are many issues that organisations can encounter when dealing with information security; from lost files and credential sharing, to protecting intellectual…


Google warning over Huawei devices blog image

Google Warning Over Huawei Devices

Huawei Concerns Continue Having been essentially banned from any form of collaboration with the Chinese technology giant Huawei since May of last year, Google has restricted the access of any new…


How Much Compensation for Breach of Data Protection Act blog image

How Much Compensation for Breach of Data Protection Act?

Your Data Rights and Right to Compensation Under the UK’s data protection law, there are 7 main rights afforded to you. These rights pertain to many aspects of your data sovereignty, including…


what is phishing in computer blog image

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Fundamentals of Information Security Awareness Assuming you have an email account, which in all likelihood you do, it’s basically guaranteed that at some point you’ve received a phishing email.…