Tag Archives: cyber security

Worrying shortage of cybersecurity staff

      Comments Off on Worrying shortage of cybersecurity staff

When it comes to choosing a career in the world of cyber, security seems to be a less attractive option than hacking – judging by the severe shortage of qualified cybersecurity recruits. Just as there were ‘two girls for every boy’ for Jan and Dean, according to anti-virus guru John… Read more »

Share

The simple way for SMEs to stay cybersafe

      Comments Off on The simple way for SMEs to stay cybersafe

By taking preventative measures, the world has largely wiped out diseases such as smallpox, polio and malaria. The next big challenge is to eradicate cyber crime. Almost four million cyber crime offences were committed in Britain last year, accounting for nearly 40% of all recorded criminal incidents. SMEs with finite… Read more »

Share

Cars held to ransom(ware)

      Comments Off on Cars held to ransom(ware)

While technology has improved automotive safety in plenty of ways, the increase in internet connectivity also opens the door to potential cyber criminals. Nearly three quarters of new cars have telematics systems, giving hackers the opportunity to lock drivers inside or outside their vehicles or even freeze the ignition; leaving… Read more »

Share

Scottish lawyers get cyber smart

      Comments Off on Scottish lawyers get cyber smart

New research by market research company Ipsos MORI which was commissioned by the Law Society of Scotland reveals that, while cyber security is a worry, most solicitors north of the border view technology as an aid to their practices. The findings unveiled at the Law Society’s Technology and Cybercrime Conference… Read more »

Share

The cyber crimes that escaped the limelight

      Comments Off on The cyber crimes that escaped the limelight

Just as politicians like to use a big disaster story to divert attention from their smaller gaffes, so the massive Yahoo debacle has allowed a number of other security breaches to slip under the radar. As well as the previously chronicled attack on a nuclear power plant, a hacker has… Read more »

Share

Office 365 gets security thumbs up

      Comments Off on Office 365 gets security thumbs up

Around 60 million businesses have adopted Office 365 as their cloud-based office suite of choice. While its in-built security features are viewed in a positive light, they can also be augmented with add-ons. The specific characteristics that customers favour include Active Directory – which is easy to integrate with in-house… Read more »

Share

A question of security

      Comments Off on A question of security

In the wake of the recent record-breaking Yahoo security breach, questions are being asked about whether security questions – such as the user’s birthplace or the name of a first pet – are still viable. Once this information is in the hands of hackers, it can have the unfortunate side… Read more »

Share

Email – the root of all evil

      Comments Off on Email – the root of all evil

Amazingly, email has been around in one form or another for nearly 50 years – but is it finally past its sell-by date? As far as cyber crime goes, it is an unlocked door or unattended handbag; offering an irresistible opportunity to any light-fingered passer-by. Some would argue it is… Read more »

Share

HTTPS, our silent cyber security friend

      Comments Off on HTTPS, our silent cyber security friend

What happens when you add an S to HTTP? Answer – the Internet magically becomes a whole lot more secure. Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the World Wide Web. Imagine the Internet as a series of tubes. Security-wise, with HTTP those tubes are totally… Read more »

Share

New Chinese rules could open the door to hackers

      Comments Off on New Chinese rules could open the door to hackers

A coalition of international businesses is lobbying the Chinese government to ask it to rethink its new cyber security legislation. The new laws were first mooted in 2015, essentially as a means to give the Chinese government more control over its IT infrastructure as a way of increasing censorship powers…. Read more »

Share