
Protecting your Emails with DKIM/DMARC
Sending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
Sending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
The financial sector is uniquely exposed to cyber risk because of the large amounts of data and high-risk transactions that are handled.
In the 200 mph world of Formula 1, speed and precision are paramount. But, it wasn’t a race car that brought the Fédération Internationale de l’Automobile (FIA) to its knees—it was a cleverly crafted email
What is your earliest recollection of IT in your life? I was about 13 years old, and I remember arguing with my dad about whether I could stay up all night to play computer games on a PC that he had brought home.
There’s a common myth going around that Microsoft 365 automatically protects and backs up your data. Sadly, it’s a popular misconception that many businesses put themselves at risk with
June was a black month with some of the worst cyber hacks perpetrated in 2024 so far. Ticketmaster, the NHS and Santander were all in the national press, with news of them being hacked by cyber terrorists.
This time 40 years ago in June 1984, Ghostbusters was the number one film.
So, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?
I can remember how much it cost to see Star Wars, my first car’s registration plate or who was number 1 in the charts, 30 years ago, but a password from yesterday?
There are many sides to cyber crime. However, there is another aspect of the horror of cyber crime that is the cyber scam factory.
In the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.
The world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
Southern Water now admits that as many as half a million customers’ personal information may have been stolen in the recent cyber attack.
Phishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.
Southern Water confirms network breach, as cybercriminals Black Basta attempt to hold the UK utility to ransom as they threaten to release data.
You go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.
Lush the cosmetics store, home to some of the most beautiful fragrances in the high street, has announced on its website, that it had been the victim of a cyber security incident.
Ransomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape
When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
Michael Caine, Cameron Diaz, Will Smith, Barbara Streisand, Patrick Swayze, (that’s not fair), Halle Berry and even Robert de Niro have won one. ‘The Golden
Mobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources
Not quite the opening line of Hamlet, Act 1 Scene 1. However, in Shakespeare’s version as Bernardo looks out from the misty battlements, high up
Wi-Fi is everywhere. Buses, trains, cafes and pubs of course. It’s at the gym, taxis, shopping centres, the list goes on. Hold on a minute,
The news is full of it at the moment; a recession is just around the corner. ‘The recession we have been dreading is about to
In its purest form, DDoS stands for Distributed Denial of Service. A DDoS attack is a combined cyber attack on a specific server or network,
Beware of people posing as someone else online – it’s a growing threat to individuals and businesses. The phenomenon has been known as ‘catfishing’ for
There’s a lack of cyber security expertise and insufficient expenditure in many organisations which makes them more vulnerable to cyber-attacks. One of the most vulnerable
The theft of up to 500 million customer records from the Marriott hotel group is a shocking reminder to everyone how vulnerable personal information is
Be warned against buying hardware from China, it could be fitted with extra micro-chips designed to break into your organisation. The threat from technology built
A massive breach of security at British Airways, which compromised 380,000 card payments, shows that organisations of all sizes are vulnerable to cyberattacks if their
Chilling new research reveals cyber criminals are outspending big businesses and posing an ever-increasing threat to UK companies. The survey commissioned by software company Carbon
Companies should be aware of the hidden security threat from fax machines which are an unlocked backdoor for criminals. New research from Check Point Security
Companies need to protect their people and systems against hacktivism because it can compromise their networks. Worse still, it can be a cover for cyber
A data breach that occurred two years ago has now cost Uber its licence to operate a taxi-hailing service in Brighton. It’s a perfect example
The launch of a new security standard for wi-fi connectivity will make remote access much safer. Version three of Wi-Fi Protected Access (WPA3) follows research
Two-factor authentication is now essential to beat cyber criminals.
Beware of social engineering by cyber criminals. It’s an ever-growing threat to businesses worldwide.
Loss of emails can badly affect operational effectiveness and could breach data protection law if the lost correspondence contains customer records.
Phishing attacks by cyber criminals are becoming much more difficult to spot and many people are still being duped into taking the bait.
Many victims of ransomware attacks are turning to No More Ransom to have their data unlocked for free but the best way to beat cyber crime is by improving IT security.
Cyber-crime is now such a major threat to UK businesses that many companies will soon have to prove they are properly protected to avoid losing key contracts.
Many growing companies are choosing Microsoft 10 Enterprise because of the enhanced security it offers.
Many companies think they have good IT security to protect them from external attacks but are still vulnerable to insider threats.
Too many businesses are lazy about passwords and risk being hacked. They are in danger of losing vital data and badly damaging their reputation.
Whaling on the oceans may be a thing of the past in most countries but it’s now a major threat in the cyber world.
If you’re serious about selling services to major organisations then you need to have ISO27001.
Businesses across Sussex are being warned about ransomware which invades IT systems often via infected email attachments.
Companies that are still using older versions of Microsoft’s Internet Explorer must upgrade as soon as possible.
If they don’t, their systems will be vulnerable to attack.