Is Skype Safe and Secure? What are the Alternatives?
By in Information Security, on July 20, 2016 at 12:16 pm
Is Skype Safe and Secure? What are the Alternatives?

Is Skype a good option for those who value their privacy and security? We take a look at how safe and secure Skype is and what the alternatives are.

Pros and cons of password managers – Lee Munson vs. Simon Edwards
By in Information Security, on May 19, 2016 at 12:02 pm
Pros and cons of password managers – Lee Munson vs. Simon Edwards

Our own Lee Munson goes head-to-head with SE Labs Director Simon Edwards to make the case for and against the use of password managers

CEO Fraud and how to avoid falling victim to it
By in Information Security, on April 4, 2016 at 9:56 am
CEO Fraud and how to avoid falling victim to it

CEO Fraud is on the rise and the costs to businesses can be huge. So what is it, and what can you do to prevent it happening to you?

The history of ransomware
By in Information Security, on February 16, 2016 at 12:28 pm
The history of ransomware

Ransomware – what is it, how has it evolved and how can you protect your computer and data from it?

Understanding DoS and DDoS attacks
By in Information Security, on January 22, 2016 at 4:04 pm
Understanding DoS and DDoS attacks

If you keep up with cyber security news you’ve likely seen much mentioned about DoS and DDoS attacks, but what do those letters mean and what is the difference between the two?

2016 Prediction: Designing Internal IT Networks as Hostile Environments
By in Information Security, on December 30, 2015 at 7:09 am
2016 Prediction: Designing Internal IT Networks as Hostile Environments

My prediction is that 2016 will see a new IT security paradigm take hold, one based on viewing and designing the Internal Network as a hostile environment. This model will be based on an “Assume Breach” assumption and IT Security focus will move back from the perimeter to the internal network.

The week in InfoSec – Santa barred from 1-in-5 internet pipes, avoiding tech support scams & ransomware on your Smart TV
By in Information Security, on December 1, 2015 at 10:35 am
The week in InfoSec – Santa barred from 1-in-5 internet pipes, avoiding tech support scams & ransomware on your Smart TV

This week’s news highlights the need to educate people on security basics, how to avoid scams and the potential issues surrounding Smart TVs and other IoT devices.

Week in InfoSec – perils of the festive season, a cool map & 2 developments in authentication
By in Information Security, on November 23, 2015 at 9:15 am
Week in InfoSec – perils of the festive season, a cool map & 2 developments in authentication

The festive season always appears to encourage scammers and spammers and a great interactive map from Norse Corp may just start showing an uptick in attacks soon to reflect that. Meanwhile, a Kickstarter project and Amazon highlight how account security is as important as ever while offering a way to bolster yours.

This week in InfoSec – fridges, phish, backward bikes & why InfoSec pros don’t like Fridays
By in Information Security, on November 9, 2015 at 10:04 am
This week in InfoSec – fridges, phish, backward bikes & why InfoSec pros don’t like Fridays

After a couple of weeks dominated by TalkTalk and other breaches it refreshing to see a slight shift in focus among those commenting on the security industry. This week’s roundup therefore focuses on the Internet of Things, spearphishing, how bad news (or lack thereof) can affect stock prices and why InfoSec professionals should maybe dread Fridays more than Mondays.

M&S website temporarily suspended after leaking customers’ details
By in Information Security, on October 29, 2015 at 4:03 pm
M&S website temporarily suspended after leaking customers’ details

Data breaches come in many different forms and sizes. Not all are a result of malicous hackers, but each can be just as devastating when victims’ personal information falls into the wrong hands.

Page 9 of 10