Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

The Dangers of Running Outdated Software

on 29-Jan-2023 09:00:00 By | Aaron Hayes. | 0 Comments | Cybersecurity IT News Security Technology
In this blog, we will explore the dangers of running out-of-date software and how Aabyss can help your business identify and avoid these pitfalls. Don't forget to claim your FREE infographic "What Does End of Support Mean for Your Business?" before you leave.
Read More

Cyber Assessment Framework, plan for mandatory compliance on the horizon

on 24-Nov-2021 11:57:56 By | Adam Lewis | 0 Comments | Cyber IT News Managed Service Security
MSPs and cloud providers in line for legal regulations after government consultation. Government officials have issued their response to a cyber security consultation held earlier this year looking at possible changes to the Computer Misuse Act. Now the responses have been digested it is looking increasingly likely that information security practices are going to become a matter of a legally binding framework of responsibilities.
Read More

Records of 106 Million Travelers to Thailand Exposed

on 24-Sep-2021 13:22:26 By | Adam Lewis | 0 Comments | Cybersecurity Security
A gargantuan cache of data totalling over 200Gb has been exposed on the web, researchers from Comparitech report. Contained within the database were records of 106 million people who travelled into Thailand during the last decade. The database was first discovered on August 22nd 2021 at which point the operator of the database was immediately informed. This rapidly led to the Thai authorities being made aware of the issue.
Read More

T-Mobile breach reported, over 40 million records exposed

on 20-Aug-2021 12:34:06 By | Adam Lewis | 0 Comments | Attack Security
Mobile telecoms giant T-Mobile are the latest high profile cyberattack victim with hackers stealing a huge cache of customer data reportedly including US social security number and driving licence information among other key personal details. This breach only affects their USA customers data and UK customers are not currently thought to be at risk.
Read More

UK tie for 2nd in UN 2020 Global Cyber Security Index

on 30-Jun-2021 13:00:00 By | Adam Lewis | 0 Comments | Cyber Cybersecurity Security
The United Nations International Telecommunication Union (ITU) published its 2020 Global Cyber Security Index on Tuesday 29th June, listing USA in first place, closely followed by the UK and Saudi Arabia in a tie for second place.
Read More

Multi-Factor Authentication 101

on 11-May-2021 17:00:00 By | Andrew Allen | 0 Comments | Cybersecurity Password Security
You have probably already come across the term multi-factor authentication. The concept is not new, but has caught on really quick of late. In this post, we will discuss what multi-factor authentication is and why you should be adopting it.
Read More

Email Security Best Practice Guide

on 04-Dec-2018 13:06:59 By | Keith Smith | 0 Comments | Cybersecurity Security Tips & Tricks
Despite the ever-increasing amount of communication applications, email remains and is likely to remain the primary method of communicating important information between employees and customers. We use it to verify our identity, send our thanks or apologies, invoices, offers, and information amongst many other vital things. It is something we demand and depend upon if we are to interact smoothly with our partners and clients. Yet many of us don’t require or at least practice security standards that befit such an essential and often sensitive act. Startling is that the writing is on the wall when it comes to email security!
Read More

How To Know And What to Do When Your Password Is Compromised - 2018

on 23-Nov-2018 09:11:00 By | Keith Smith | 0 Comments | Password Security
Malicious actors are unscrupulous and will invest large amounts of time attempting to profit from your personal information. Unfortunately, it is estimated over half a billion stolen passwords are floating around on the internet, many of them on sale to the highest bidder. Being on the receiving end of this illicit trade, can be life-changing. But its not all bad news! Thankfully there are helpful practices you can implement right now to mitigate this problem. Here’s our guide on how to know and what to do when your password is compromised.
Read More

10 Best Practice Password Tips

on 20-Nov-2018 09:52:23 By | Keith Smith | 0 Comments | Cybersecurity Password Security
‘00000000’ – Minuteman intercontinental ballistic missile launch code Alarmingly at one time, the U.S. had no secret launch codes on its nuclear missiles at all. Then in 1962, the White House had them installed in an attempt to bring some sense of security. Despite the strong objections of the U.S. Strategic Air Command who bemoaned that the extra protection may affect deployability speeds, the codes became a reality. However, to effectively circumvent the White House directive, the “secret unlock codes” were set to eight zeros.
Read More

Malicious Fax Flaws Leave Businesses Exposed

on 14-Aug-2018 16:27:01 By | Jack Whisker | 0 Comments | IT News Security Technology
Fax machines have moved from office essential to dust collector in the space of 15 years. The development of the internet and printers outdated the fax machine quicker than most expected. Despite this, as printers are often all-in-one fax machines can still be found in the majority of offices and whilst forgotten about they can pose a big security risk.
Read More