What’s All the Fuss About LastPass?

Featured Article : What's All the Fuss About LastPass?

Following news that hackers have stolen encrypted backups from the parent company of popular password manager LastPass, we look at what password managers are, plus the implications of the attack for businesses.  Password Challenges  We are all used to using passwords but without extra measures (e.g. 2FA) they are now recognised as having security limitations…

Read More

No Bank Robberies For First Time Ever (in Denmark)

Tech News : No Bank Robberies For First Time Ever (in Denmark)

Although figures show no bank robberies last year in Denmark, it appears online banking fraud and other forms of digital crime are now replacing the traditional ‘hold-up’.  Why No Bank Robberies?  It is believed that the recent Danish bank association ‘Finans Danmark’ figures showing no physical bank robberies in 2021 compared to 221 back in…

Read More

New Deadline To Remove Huawei

Tech News : New Deadline To Remove Huawei

Following the UK government’s decision back in June 2020 to remove all Huawei Equipment From 5G Network Cores, the deadline has now been pushed back to December 2023.  Why Remove Huawei Equipment?  The decision to remove the equipment in the UK dates back to the Trump era in the US, however worries about national security…

Read More

What Are ‘BEC Campaigns’?

What Are 'BEC Campaigns'?

In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns.  What Is A BEC Campaign?  A business email compromise (BEC) campaign is a kind of text-based, impersonation, social engineering scam where, in most cases, the victim is forwarded…

Read More

Nearly Half of Employees Use Risky Login Practices

Tech News : Nearly Half of Employees Use Risky Login Practices

A new study by 1Password has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work.  Taking Risks With Company Security  The study, by passwords manager maker 1Password which surveyed 2,000 US workers, found that 44 per cent…

Read More

Sharing Files That Self-Destruct

Sharing Files That Self-Destruct

In this insight, we take a look at some of the many options available for sharing files that self-destruct. Why? Many business IT users have occasions where they need to send sensitive information, e.g. passwords and other private work data and files but would feel uneasy about simply sending it via the normal email system,…

Read More

UK Broadband And Mobile Carriers Face Tough New Security Rules

UK Broadband And Mobile Carriers Face Tough New Security Rules

The UK government’s Department for Digital, Culture, Media and Sport has proposed a new set of rules to tighten up network security against cyberattacks in broadband and mobile carriers.  Amongst The Strongest In The World  The government says that the new regulations and code of practice, developed with the National Cyber Security Centre and Ofcom,…

Read More

Protect Yourself From Job Phishing Scams

Protect Yourself From Job Phishing Scams

In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud.  What Is Job Phishing?  Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…

Read More

How Can You Protect Yourself From ‘Identity Theft’?

How Can You Protect Yourself From ‘Identity Theft’?

With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud.  What Are Identity Theft and Identity Fraud?  Identity theft is when…

Read More

New Windows Feature Displays Which Apps Have Been Listening-In

New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity.  See Which Apps Have Accessed Your Microphone and Camera  David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…

Read More