Security
3% of Users Responsible For 92% Of Breaches
A report by Security Company ‘Elevate’ has revealed that 3 per cent of users are responsible for 92 per cent of malware events for businesses, indicating that a small number of users create the most risk. 2016 to 2021 ‘The Size and Shape of Workforce Risk’ report, conducted on data provided to the Cyentia Institute…
Read MoreOkay, Ukraine Is Being Attacked. How Worried Should We Be?
In this article, we look at how, in addition to the devastating missiles, rockets, bombs, tanks and other weapons, Ukraine has also been the subject of cyber-warfare and we look at how these and other war-related issues could be cause for concern across Europe. War In Ukraine At the time of writing this article, as…
Read MoreWhy Solid Black Bars May Be Best For Redacted Text
In this insight, we look at how to best to avoid redacted text from being ‘unredacted’ by certain software tools, and we look at what researchers advise based on recent experiments. The Problem For businesses and organisations, the increased need for data sharing and/or making some data public can mean that certain (sensitive) parts of…
Read MoreEx School IT Technician Jailed For Cyber Attack
A sacked school IT Technician who took revenge by deleting data and sabotaging his old school’s network (and by wiping the computers of everyone who was logged in) has been jailed. Revenge Hack As reported on Leicestershire Live, a court was told that Adam Georgeson, 29, who was dismissed from his job as an IT…
Read MoreHow Microsoft Will Block Macros To Stop Malware
Microsoft recently announced that it will be blocking Visual Basic for Applications (VBA) macros by default as a way to stop the spread of malware. Since these macros are important automation tools for Microsoft Office apps, how is this going to work? What Are Visual Basic for Applications (VBA) Macros? Visual Basic for Applications (VBA)…
Read MoreEuropean Oil Facilities Targeted By Cyber Attacks
In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…
Read MoreTech Insight : What Is A ‘Watering Hole’ Attack?
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…
Read MoreFeatured Article: How To Stop Your Emails From Ending Up In Spam Filters
In this article, we look at how spam filers work and what can be done to ensure that our legitimate emails reach their target and aren’t wrongly filtered out as ‘spam’ . Why We Need Spam Filters Although we’re focusing on how to avoid spam filters, it’s worth noting how important they are to businesses.…
Read MoreSecurity Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins
It has been reported that 40 themes and 53 plugins belonging to AccessPress Themes, a Nepal-based company were backdoored with malicious code in the first half of September 2021. It is believed that the infected extensions gave attackers full access to sites, and that access also appears to have been sold to operators of spam…
Read MoreThe Essentials Of A ‘BYOD’ Policy
In this article, we look at what BYOD is, why a BYOD policy is important, and what elements form the essential blueprint of a BYOD policy. What Is BYOD? The term Bring Your Own Device (BYOD) has been around since 2004 when it was first coined as an expression. With BYOD, employees can bring and…
Read More