With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article takes a brief look at what a ‘Zero Trust’ approach is and how it can help. More Complex Security Demands The belief among many IT security experts is that a traditional perimeter-based security…

Read More

Two-Factor-Authentication (2FA) refers to another piece of information that users are required to provide (in addition to username and password login details) to access a website/platform/account. Requiring another piece of information protects against others accessing the account if they simply know the username and password. Reasons The reasons for 2FA include: – A huge increase…

Read More

After John McAfee was found dead in a Barcelona prison cell last week, we take a brief look at the colourful life of this complicated, maverick software entrepreneur. McAfee Antivirus The products that made John McAfee a household name were his antivirus software and anti-spam products. John McAfee formed his software company, originally called McAfee…

Read More

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…

Read More

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…

Read More

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…

Read More

As part of Google’s latest security updates to Chrome and Android, users will not only be alerted if any of the passwords in their Password manager are compromised but will also be given the opportunity to make a quick fix. Quick Fix – Change Password In the ongoing competitive battle between Google’s Chrome browser (and…

Read More

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…

Read More

In this article, we take a brief look at the importance of patch management in maintaining security. Patches and Patch Management Patches are the software fixes for known security vulnerabilities in software such as operating systems, third-party applications, cloud-platforms, and embedded systems. Patch management is the ongoing process of distributing and applying those important security…

Read More

MI5 is using a ‘Think before You Link’ campaign to warn its workers about the growing threat of being targeted for information by actors for hostile states using fake profiles on platforms such as LinkedIn. Think before You Link It has been reported that MI5 believes that more than 10,000 British nationals have been targeted…

Read More