Information Security
Information Security Principles: What is the CIA Triad?
In 2018, 72% of large businesses and 31% of small businesses identified breaches or attacks. The average cost of these attacks has risen an enormous 27% from the previous year. Though it is perhaps…
Suspicious Certificates, Transparency and HTTPS
Will Certificate Transparency Help to Rebuild Confidence in Certificate Authorities? With research suggesting an increasing trend towards SSL certified phishing websites (some up to 58%), users…
Information Commissioner’s Office Mining Crypto
When it Comes to Information Security, Pobody’s Nerfect When we think about security and vulnerability, it’s tempting to sometimes believe there is a ‘fix’ to security issues; that with enough…
Spear Phishing Series Part 3: What to do if You’ve Been Phished
In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…
Will Confirmation of Payee Reduce APP Scams?
In a bid to help reduce the likelihood of customers being duped into transferring funds to fraudulent bank accounts, the UK’s six largest banking groups will be implementing Confirmation of Payee by…
Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email
Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…
Human Rights and the Growing Surveillance Economy
Duopoly, Personal Data and the Tech Giants That Sell Your Secrets Human Rights and the Growing Surveillance Economy: Amnesty International has released a damning report into surveillance-based…
Attention: HP's Self-Destructing Firmware
Uptime Bug Risks Huge Data Loss for HP Customers HP firmware issue: The technology manufacturer Hewlett Packard has announced a firmware issue that could affect thousands of enterprise users. A…
Spear Phishing Series part 1: How a Spear-Phishing Email is Created
Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…
Information Security vs Cyber Security: What’s the Difference?
Anyone who spends time researching or reading around the subject of security, will have likely asked themselves the "Information Security vs Cyber Security" question at some point. How is it that…