Information Security

what is the cia triad blog post image

Information Security Principles: What is the CIA Triad?

In 2018, 72% of large businesses and 31% of small businesses identified breaches or attacks. The average cost of these attacks has risen an enormous 27% from the previous year. Though it is perhaps…


blue with white text certificate transparency blog image

Suspicious Certificates, Transparency and HTTPS

Will Certificate Transparency Help to Rebuild Confidence in Certificate Authorities? With research suggesting an increasing trend towards SSL certified phishing websites (some up to 58%), users…


ICO Cryptojacking blog image

Information Commissioner’s Office Mining Crypto

When it Comes to Information Security, Pobody’s Nerfect When we think about security and vulnerability, it’s tempting to sometimes believe there is a ‘fix’ to security issues; that with enough…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…


confirmation of payee blog image

Will Confirmation of Payee Reduce APP Scams?

In a bid to help reduce the likelihood of customers being duped into transferring funds to fraudulent bank accounts, the UK’s six largest banking groups will be implementing Confirmation of Payee by…


How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…


Surveillance economy blog post image

Human Rights and the Growing Surveillance Economy

Duopoly, Personal Data and the Tech Giants That Sell Your Secrets Human Rights and the Growing Surveillance Economy: Amnesty International has released a damning report into surveillance-based…


HP firmware issue blog post image

Attention: HP's Self-Destructing Firmware

Uptime Bug Risks Huge Data Loss for HP Customers HP firmware issue: The technology manufacturer Hewlett Packard has announced a firmware issue that could affect thousands of enterprise users. A…


How is a spear-phishing email created blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…


information security vs cyvber security blog post image

Information Security vs Cyber Security: What’s the Difference?

Anyone who spends time researching or reading around the subject of security, will have likely asked themselves the "Information Security vs Cyber Security" question at some point. How is it that…