Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

What To Consider When Implementing Multi-Factor Authentication

on 28-Nov-2018 13:01:00 By | Keith Smith | 0 Comments | Cybersecurity Password
Trust is placed in friends and family and earned by those we don’t know. Our communities depend on it and will not arise spontaneously without it. Trust is an integral part of our lives. Problematic is that in today's hectic business environment, we are often forced to interact at a moment's notice with people we just don’t know. We may be required to admit them access to critical infrastructure that underpins the very foundation of our business. Even when we know them, do we really know it's them we are interacting with the entire time?
Read More

How To Know And What to Do When Your Password Is Compromised - 2018

on 23-Nov-2018 09:11:00 By | Keith Smith | 0 Comments | Password Security
Malicious actors are unscrupulous and will invest large amounts of time attempting to profit from your personal information. Unfortunately, it is estimated over half a billion stolen passwords are floating around on the internet, many of them on sale to the highest bidder. Being on the receiving end of this illicit trade, can be life-changing. But its not all bad news! Thankfully there are helpful practices you can implement right now to mitigate this problem. Here’s our guide on how to know and what to do when your password is compromised.
Read More

We Made the Hall of Fame

on 21-Nov-2018 10:08:55 By | Keith Smith | 0 Comments | Aabyss News IT News
Fantastic news! We are now Hall of Famers! We are delighted to be able to share with you all our latest award that we picked up at DattoCon18 in Barcelona! Creating and helping our clients implement disruptive business models is our purpose here at Aabyss, and we literally travel the globe to achieve it!
Read More

10 Best Practice Password Tips

on 20-Nov-2018 09:52:23 By | Keith Smith | 0 Comments | Cybersecurity Password Security
‘00000000’ – Minuteman intercontinental ballistic missile launch code Alarmingly at one time, the U.S. had no secret launch codes on its nuclear missiles at all. Then in 1962, the White House had them installed in an attempt to bring some sense of security. Despite the strong objections of the U.S. Strategic Air Command who bemoaned that the extra protection may affect deployability speeds, the codes became a reality. However, to effectively circumvent the White House directive, the “secret unlock codes” were set to eight zeros.
Read More

Culture Eats Strategy

on 15-Nov-2018 09:35:47 By | Keith Smith | 0 Comments | Management Strategy
Why do certain people and businesses succeed where others fail? Why do certain people and businesses find success consistently and repeatedly while others don't?
Read More

Liverpool can help lead the Fourth Industrial Revolution

on 13-Nov-2018 11:35:18 By | Keith Smith | 0 Comments | Connectivity IT News Technology
For Liverpool the future is exciting! Last week the Aabyss team attended the 2018 Liverpool City Region Digital Summit hosted by LCR Activate, and what an event it was.
Read More

Malicious Fax Flaws Leave Businesses Exposed

on 14-Aug-2018 16:27:01 By | Jack Whisker | 0 Comments | IT News Security Technology
Fax machines have moved from office essential to dust collector in the space of 15 years. The development of the internet and printers outdated the fax machine quicker than most expected. Despite this, as printers are often all-in-one fax machines can still be found in the majority of offices and whilst forgotten about they can pose a big security risk.
Read More

Develop Leadership with a Technology Focused Business Plan

on 10-Aug-2018 12:24:33 By | Andrew Allen | 0 Comments | Management Strategy Productivity
Dependable outcomes prove a productive business. Whether productivity derives from acquiring new customers, streamlining business processes or maintaining an organisational workflow, a proper business plan provides a welcomed resource for progress in all areas concerned. Designing and adhering to a plan however can unearth difficulties that must be addressed. Optimising a business plan through a focus on technology will not only discover problems, but it will also allow management to comb finely through each business process and sort out incongruities that cause delay, waste and frustration. It will further provide support to expose any unsuspected or unknown risks that might deter future growth. By committing to act through a technological objective, businesses can expect to see real, tangible returns.
Read More

Ticketmaster ignored warnings months before data breach

on 02-Jul-2018 17:20:42 By | Jack Whisker | 0 Comments | Aabyss News Cyber Cybersecurity Security
Ticketmaster have become one of the first companies to have a major data breach since the arrival of GDPR. Data including payment details, addresses, names and phone numbers of around 40,000 users have all been affected by the breach. Ticketmaster say the breach was first detected on the 23rd June and affected 5% of its customers.
Read More

TSB turmoil sees rise in phishing attacks

on 23-May-2018 15:57:25 By | Jack Whisker | 0 Comments | IT News Security
TSB customers have reported a significant increase in phishing attacks connected to the recent TSB IT incident. A total of 176 complaints have been made since April 30 as hackers seize the opportunity to try and attack the vulnerable bank's customers. Nearly four weeks on from the banking meltdown the issue has not been averted and it has become an easy payday for hackers and scammers. With people’s apps and online banking being down this has allowed hackers to make off with thousands of pounds worth of savings from peoples accounts due to similar looking emails requesting personal account information, something a bank would never do over email.
Read More