48

News & Opinion

Gain the edge on the world of business technology and cyber security

Cybersecurity in 2019: Expectation Vs Reality

on 30-Dec-2019 10:05:37 By | Andrew Allen | 0 Comments | Cybersecurity Technology
In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tools and techniques to meet the challenges posed by the latest cyber threats. In fact, many also predicted last year about how the attack tactics of adversaries would grow, what technologies would play a critical role in shaping the future of cybersecurity, and more.
Read More

The Most Common Passwords Found From Breaches in 2019

on 30-Dec-2019 10:05:02 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course the password ‘password’. A bunch of independent anonymous researchers composed a list of 200 most popular passwords that were leaked in data breaches during 2019 and shared it with security firm NordPass.
Read More

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

on 13-Jun-2019 11:56:14 By | Keith Smith | 0 Comments | Cybersecurity
One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magical cave containing vast treasures. Equipped with the secret password he waits until they depart and makes for the entrance of the magic cave. Once upon it, he merely repeats the words “Open Sesame” and with that enters and makes off with the treasure.
Read More

Festive Fraud!

on 07-Dec-2018 13:50:43 By | Greg Jones | 0 Comments | Cybersecurity Tips & Tricks
As the hustle and bustle of Christmas kicks in, make sure you don’t fall prey to festive fraud! A recent report by Action Fraud found that last year 15,024 people were conned out of £11 million by fraudsters over the Christmas period!
Read More

Email Security Best Practice Guide

on 04-Dec-2018 13:06:59 By | Keith Smith | 0 Comments | Cybersecurity Security Tips & Tricks
Despite the ever-increasing amount of communication applications, email remains and is likely to remain the primary method of communicating important information between employees and customers. We use it to verify our identity, send our thanks or apologies, invoices, offers, and information amongst many other vital things. It is something we demand and depend upon if we are to interact smoothly with our partners and clients. Yet many of us don’t require or at least practice security standards that befit such an essential and often sensitive act. Startling is that the writing is on the wall when it comes to email security!
Read More

What To Consider When Implementing Multi-Factor Authentication

on 28-Nov-2018 13:01:00 By | Keith Smith | 0 Comments | Cybersecurity Password
  Trust is placed in friends and family and earned by those we don’t know. Our communities depend on it and will not arise spontaneously without it. Trust is an integral part of our lives. Problematic is that in today's hectic business environment, we are often forced to interact at a moment's notice with people we just don’t know. We may be required to admit them access to critical infrastructure that underpins the very foundation of our business. Even when we know them, do we really know it's them we are interacting with the entire time?
Read More

10 Best Practice Password Tips

on 20-Nov-2018 09:52:23 By | Keith Smith | 0 Comments | Cybersecurity Password Security
‘00000000’ – Minuteman intercontinental ballistic missile launch code Alarmingly at one time, the U.S. had no secret launch codes on its nuclear missiles at all. Then in 1962, the White House had them installed in an attempt to bring some sense of security. Despite the strong objections of the U.S. Strategic Air Command who bemoaned that the extra protection may affect deployability speeds, the codes became a reality. However, to effectively circumvent the White House directive, the “secret unlock codes” were set to eight zeros.
Read More

Ticketmaster ignored warnings months before data breach

on 02-Jul-2018 17:20:42 By | Jack Whisker | 0 Comments | Aabyss News Cyber Cybersecurity Security
Ticketmaster have become one of the first companies to have a major data breach since the arrival of GDPR. Data including payment details, addresses, names and phone numbers of around 40,000 users have all been affected by the breach. Ticketmaster say the breach was first detected on the 23rd June and affected 5% of its customers.
Read More

Top 3 Security issues for 2018

on 08-Feb-2018 17:05:28 By | Jack Whisker | 0 Comments | Cybersecurity IT News Security Tips & Tricks
2017 has been a big year concerning cyber security, positively and negatively. The rise of Ransomware into the mainstream news with global attacks on businesses and record numbers of data breaches such as Yahoo having one billion accounts accessed by hackers. IT security is one of the fastest moving industries, and it's vital that every business tries to keep up and stay protected.
Read More

1.4 Billion hacked and leaked passwords found on the dark web

on 18-Dec-2017 10:06:50 By | Jack Whisker | 0 Comments | Cybersecurity IT News Password Security
1.4 Billion hacked and leaked passwords have been collated in a single file and are currently sitting on the dark web. Security firm 4iQ who discovered the files say that rather than this being a new breach it is a collection of several previous breaches. None of the passwords are encrypted and all the data has been put into a searchable, interactive database.
Read More