Security
New Deadline To Remove Huawei
Following the UK government’s decision back in June 2020 to remove all Huawei Equipment From 5G Network Cores, the deadline has now been pushed back to December 2023. Why Remove Huawei Equipment? The decision to remove the equipment in the UK dates back to the Trump era in the US, however worries about national security…
Read MoreWhat Are ‘BEC Campaigns’?
In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns. What Is A BEC Campaign? A business email compromise (BEC) campaign is a kind of text-based, impersonation, social engineering scam where, in most cases, the victim is forwarded…
Read MoreNearly Half of Employees Use Risky Login Practices
A new study by 1Password has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work. Taking Risks With Company Security The study, by passwords manager maker 1Password which surveyed 2,000 US workers, found that 44 per cent…
Read MoreSharing Files That Self-Destruct
In this insight, we take a look at some of the many options available for sharing files that self-destruct. Why? Many business IT users have occasions where they need to send sensitive information, e.g. passwords and other private work data and files but would feel uneasy about simply sending it via the normal email system,…
Read MoreUK Broadband And Mobile Carriers Face Tough New Security Rules
The UK government’s Department for Digital, Culture, Media and Sport has proposed a new set of rules to tighten up network security against cyberattacks in broadband and mobile carriers. Amongst The Strongest In The World The government says that the new regulations and code of practice, developed with the National Cyber Security Centre and Ofcom,…
Read MoreProtect Yourself From Job Phishing Scams
In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud. What Is Job Phishing? Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read MoreHow Can You Protect Yourself From ‘Identity Theft’?
With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud. What Are Identity Theft and Identity Fraud? Identity theft is when…
Read MoreNew Windows Feature Displays Which Apps Have Been Listening-In
The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity. See Which Apps Have Accessed Your Microphone and Camera David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…
Read MoreRussia Cautions Cyber Attacks May Start Military Confrontation
The growing number of cyber-attacks since the start of Russia’s war against Ukraine have led The Russian Foreign Ministry to warn that more western cyber-attacks on its infrastructure could lead to a direct military confrontation. Housing Ministry Website Hack The warning followed an apparent cyber-attack on the Russian housing ministry website which led to a…
Read MoreNew Spy-Spotting App From MI5
The UK government’s MI5-run ‘Centre for the Protection of National Infrastructure’ has launched a new app to help people spot approaches from foreign spies and organised criminals seeking sensitive information. Really? How Big Is The Problem? According to MI5, it spotted 10,000 UK nationals across society being approached last year via fake social media profiles,…
Read More