What to do if you are involved in a data breach

Being involved in a data breach can be a scary situation. Knowing that someone has access to your personal information, especially if it is sensitive, is unsettling and worrying.

Rather than panicking, it is important to stay calm and be aware of what to do when you find out that your information is part of a data breach. By taking the right steps immediately, you can protect yourself from further theft or fraud.

Read more

5 ways hackers can bypass two-factor authentication

For several years now, two-factor authentication (2FA) has been heralded as the answer to protecting sensitive accounts. For both businesses and regular people, the added security provided by requiring a code from your phone or email gave peace of mind that personal information was well-protected.

As well as codes, other forms of authentication such as biometrics, physical authentication tokens, and even being connected to a network from a specific computer have become prevalent.

Read more

Many IT leaders lack cyber security confidence

A recent study conducted by Rackspace Technology has revealed that almost half of IT leaders lack confidence in their organisation’s cyber security systems. These startling findings highlight shortcomings that businesses around the world have when responding to data breaches, malware and ransomware attacks, and other forms of cyber-attack.

The poll of 1,420 IT professionals within multiple countries showed that 42% wouldn’t even be able to understand the nature of the cyber threats they faced. For the vast majority of businesses that rely heavily on the internet and customer information, this statistic will come as a worrying shock.

Read more

Cyber-attack ‘Rocks’ the Jewellery Industry

High profile data breaches continue to dominate the headlines. With cybercriminals becoming bolder and targeting more large, multinational corporations, businesses need to be prepared for the inevitability of experiencing a cyber-attack.

The most recent of these data breaches affected jewellery firm Graff, one of the world’s leading suppliers of diamond jewellery. Russian cybercrime gang Conti carried out the attack, which enabled them to steal millions of records on some of the world’s richest and most powerful people.

Read more

Tesco targeted by a cyber-attack

Demonstrating the increasing frequency of cyber-attacks, Tesco experienced a total outage of their website and mobile app in October. Amongst the 3 most popular supermarkets in the UK, Tesco’s online services crashed after a deliberate hack, causing disruption for a huge number of consumers.

Due to the outage, when their services were back up, they had to employ a temporary “virtual waiting room” to manage the customers that were trying to place orders.

Read more

Passwordless Authentication

If you’re reading this then you are probably asking yourself, what is a Web Application Firewall (WAF)?

Does my company need one, and how much is this going to cost me?

You’re not alone

Like many others, we’ve found that a lot of cyber security companies are quite happy to give you all the technical information, which is great.

But for someone who is not so tech-savvy or clued up on web application firewalls, this can be quite overwhelming.

With so much information being thrown around no one really addresses the elephant in the room.

Read more

How to choose the right SIEM solution for your business

As a business, when you are looking for a tool to protect your business’ network infrastructure from cyber-attacks and data breaches, it can be difficult to know where to start.

During your research, you have probably been presented with a huge variety of solutions. If you have arrived at this article, Microsoft Sentinel, formerly known as Azure Sentinel, has probably been one of these solutions.

In this article, we are going to discuss why you should use Microsoft Sentinel over other SIEM and SOAR solutions. If you are looking for more basic information, take a look at our blog which introduces Sentinel and how it can benefit your business.

Read more
web-application-firewall-security

What is a WAF and do I need one?

If you’re reading this then you are probably asking yourself, what is a Web Application Firewall (WAF)?

Does my company need one, and how much is this going to cost me?

You’re not alone

Like many others, we’ve found that a lot of cyber security companies are quite happy to give you all the technical information, which is great.

But for someone who is not so tech-savvy or clued up on web application firewalls, this can be quite overwhelming.

With so much information being thrown around no one really addresses the elephant in the room.

Read more
hacker’s motive

Understanding a hacker’s motive

Understanding a hacker’s motive to plan for the future. Questions to ask your IT and security managers. In the wake of a cyberattack, police investigators will always try to identify the motive of a cyber-criminal. This helps them both detect and prevent cyber crimes in the future.Understanding the hacker’s motive behind your adversary’s action will…

Read more
Who are hackers?

Who are the cyber attackers?

Who are the cyber attackers? 30th September 2019 Wondering who the cyber attackers are? With the global growth of cyber-crime continuing throughout the year, high-profile cyber-attacks continue to be reported daily. But who are the cyber attackers and what motivates them to perform illegal and such potentially damaging activities? With a few exceptions, the cyber…

Read more