Cybersecurity Awareness: A Step-by-Step Guide

1. Identifying Threats Understand what threats can come from outside of your organisation. This may seem obvious but it’s important to understand these threats and not just be ware of them. It’s also important to understand what internal threats could jeopardise you. These can be caused by inappropriate usage of networks or a sheer lack […]

The $121,000 Runescape-Twitter Hack

On the 15th of July, an unexpected Twitter hack saw the accounts of Elon Musk, Barack Obama, Joe Biden, Jeff Bezos, Bill Gates and more fall into the hands of hackers who used that access to push a bitcoin scam. The hackers, also, accessed 36 DM (direct message) inboxes, including one for an elected official […]

Encrochat: What is it and what happened?

The latest podcast was a short one due to us trying to fit it into a busy schedule but we got one out which is the main thing. We discussed end-to-end encryption, if we need it and why, as well as covering the EncroChat hack from the very beginning of the month. The controversy surrounding […]

404:Cybersecurity not found – Episode 4

This week Neil, David and Jay discuss whether teleconferencing tools require end-to-end encryption. The NCA bust via compromising EncroChat, before reopening the whole security vs privacy debate.

How is Covid Still Affecting Communication in our Organisations?

Covid has put everyone in awkward situations. Businesses are in a difficult position right now, with many employees having to use their own devices and working from home. IT security measures are both more important than ever and more difficult to enforce. More than half of IT teams believe they are either under-equipped or still […]

404:Cybersecurity not found – episode 3

David, Neil, Jack and Luke talk about the  the Network and Information Systems Regulations (NIS). Is it a good idea, does it work, is it being implemented properly, and are the right people enforcing it? Is it broke? Can it fixed? This and more discussed! We talk about handling of marketing data, the telephone preference […]

“Ekans, I Choose You!”

A ransomware attack (bearing the mark of EKANS) on The Enel Group was detected, on the 7th June. First, who are the Enel Group? Well, the Enel Group is a multinational company that specialises in electricity generation as well as the distribution of electricity and natural gas. It has its roots in Rome and was […]

Honda Hit with a Horrible Hack

“Honda can confirm that a cyber-attack has taken place on the Honda network.” This is the statement that Honda released. They continued to explain that the problem is affecting their access to computers, email and other internal systems. But it seems that the damage is not just being dealt to the Japanese branches. The company, […]

AI in cybersecurity, 3 contrasting views

I wrote the final section in this article on how AI can be used by the bad guys against cybersecurity. It contrasts with 2 more positive views of how AI is helping us as cybersecurity practitioners by the co-authors. And in a less squint your eyes format, here is my bit …. You have now […]

Covid19 – Home Office Health Check Support

What is a Home Office Health Check (HOHC)? Our HOHCs (Home Office Health Checks), or IT health checks, are designed to detect and advise on any security issues you may have with your home office setup. Why are we Introducing the Home Office Health Check (HOHC)? The COVID-19 outbreak has forced millions of people to […]