London, 22nd March 2016: Networking Plus Magazine – Information security is not keeping pace with growing risk, according to the Institute of Information Security Professionals (IISP).
In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences?
Few will have missed the largescale ransomware attack on 12th May 2017, particularly affecting the NHS, but disrupting operations at more than 100,000 organisations in 150 countries. If we didn’t yet fully comprehend the existing threat from ransomware, we now do – unfortunately.
Threat Intelligence (CRITICAL UPDATE) Previously reported in 17 December 2019, a vulnerability has been identified in Citrix NetScaler ADC and Citrix Netscaler Gateway, which could allow an unauthenticated attacker to perform arbitrary code execution.
Whether your are self-employed, work for a small business, or indeed a large multi-national, for a while, working from home is going to become the new norm. Yet even in these challenging times, we’ve seen cyber criminals preying on people’s fears, using the Coronavirus as just another opportunity. For this reason, it is essential for […]
March 2020 Threat Intelligence (CRITICAL ALERT)
This is not meant to seem complicated, but firstly, to understand what Zscaler Private Access (ZPA) is, what it does… and why, it may be useful to understand a little bit about Zscaler Inc., courtesy of Wikipedia: “Zscaler is a cloud-based information security platform delivered through more than 100 global data centres. To use Zscaler, […]
February 2020 Threat Intelligence (CRITICAL ALERT)
Security experts have recently shared their predictions, warnings and best practices for the new year. 2020 promises a wave of technology development that will transform the industry and the lives of many people in IT in ways you won’t believe. In 2019, there certainly wasn’t a lack of damaging, publicised security breaches. And given the […]
In the past 10 years, the network has changed. And security has changed. Both consumers and businesses consume and utilise cloud services. We’re all mobile, utilising multiple devices from multiple locations. Which in turn kicked off an explosion of very real security risks. First coined in 2010 by an Analyst at Forrester Research Inc., a […]
Penetration testing is the cyber equivalent of letting someone break into your house and rummage through your drawers to see how easy it all would be to steal. Your valuables are in that house. Your underwear is in those drawers. It goes without saying that you don’t want just anyone barging through the door and […]
January 2020 Threat Intelligence (CRITICAL ALERT)
December 2019 Threat Intelligence (CRITICAL ALERT)
September 2019 Threat Intelligence (CRITICAL ALERT)
The unfortunate truth is that technology alone cannot protect you from cyber security attacks. You can have the best tools available, the most skilled security operations team, but… Unless you have an effective ‘cyber’ user awareness programme, your business will always be at risk. While it is unlikely (albeit possible) a disgruntled employee could cause […]
Your users are your biggest risk. With 90% of successful cyber attacks starting with a phishing email, the unfortunate truth is that technology alone can only do so much to protect you from cyber security attacks. Unless you have an effective user awareness programme, your business will always be vulnerable to attack. It’s an infrequent […]
It doesn’t matter whether you’re an end user or a business – it’s a difficult task to know how to improve your cyber security and defend yourself from threats you know exist but don’t fully understand! Yet, cyber criminals tend to draw on similar time-proven strategies, tactics and techniques to target infrastructures, network or personal […]
You can’t defend yourself from threats you don’t understand. While malware and phishing are fairly familiar terms, the mechanics of these types of cyber attacks is less well known. Understanding the method of delivery will help clarify the role of different security controls required to combat the common threats.
What do you think is the biggest cyber risk factor in your organisation? If your answer was your employees, you’d be right. The toughest security system on the planet can’t protect you if your staff are leaving the door wide open to cyber criminals. The process of using this weak link to access an organisation’s […]
Do you know who would be most likely to hack your information system? It’s quite possible you’ve never even thought of it. Determined attackers are constantly finding new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. There are many different types of attackers, each with their own reasons for […]
November 2019 Threat Intelligence (CRITICAL ALERT)
Penetration testing is a core tool used to analyse the security of IT systems. Done well, it can tell you where your vulnerabilities lie, how well your existing protocols are working and what more needs to be done to lower your levels of risk. But it is not a one-size-fits-all solution – and as such, […]
With more and more users working remotely and apps rapidly moving towards the cloud, it’s crucial to consider the status of your internet security in order to prevent data exfiltration.
July 2019 Threat Intelligence (CRITICAL ALERT) This month, Microsoft have patched 77 vulnerabilities; 16 of which are ranked critical and 52 marked as important. Also included within this month’s updates are fixes for 5 vulnerabilities that were made public (but not exploited). 11 of the critical bugs are for scripting engines and browsers. The additional […]