Cyber Security

Home/Tag:Cyber Security
26 06, 2017

The certifiable way to become CISSP certified!

By | 2017-06-26T09:05:54+00:00 June 26th, 2017|Security|0 Comments

Well it’s official, the ISC2 have finally bestowed upon me the prestigious CISSP (Certified Information Systems Security Professional) accreditation! I started my journey almost two years ago, just as the new 8 domain material came out.  Despite taking two years to sit the exam (will tell you why later), I managed to pass first time!  [...]

13 05, 2017

What IT Managers should be doing about the NHS Cyber Attack

By | 2017-05-13T10:22:52+00:00 May 13th, 2017|Security|0 Comments

NHS Cyber Attack Yesterday, the 12th of May 2017, there was what the media are calling a 'massive cyber attack' against the NHS.  I'm in agreement with a former leading figure at GCHQ, Brian Lord, who was interviewed on BBC Breakfast News this morning.  He stated that calling this a 'cyber attack' is somewhat misleading and [...]

12 05, 2017

What the heck is GDPR and why should an IT Manager care?

By | 2017-05-12T15:59:08+00:00 May 12th, 2017|Security|0 Comments

Here’s the scene Everyone and their dog in IT reseller land is sending you out hundreds of emails a week about GDPR. You’ve got users with problems breathing down your neck who won’t leave your desk until you’ve reset their password, which if they’d only just remember them you’d get some work done. You’ve also [...]

8 05, 2017

The differences between GDPR and Data Protection Act?

By | 2017-05-08T13:27:43+00:00 May 8th, 2017|Security|0 Comments

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. [...]

10 04, 2017

Examples of Cyber Attacks

By | 2017-04-18T15:07:55+00:00 April 10th, 2017|Uncategorized|0 Comments

We all know that cyber attacks are on the increase, but not many of us actually know what it is, or how it effects us. So, I would like to share two examples with you. Cyber Attacks Example  1 - Know who you are dealing with. A large UK multinational centralised their finance function. As part [...]

1 03, 2017

Why I hate the term cybersecurity

By | 2017-03-01T18:30:48+00:00 March 1st, 2017|Security|0 Comments

Cybersecurity and Cyber I’m going to start by saying the terms ‘cyber’ and ‘cybersecurity’ grate on me, a lot.   Seriously, it was the mid-90’s when ‘Cyberbob’ conned the rather lovely Sandra Bullock in The Net.  It was cringe worthy then - and its cringe worthy now. Hackers may have been a bit of a cooler [...]

7 02, 2017

Your network will be attacked

By | 2017-02-07T15:35:55+00:00 February 7th, 2017|Security|0 Comments

It is predicted that 2017 will be the year of cyber-crime. Attacks will increase and one thing is for sure, your network will be attacked at some point. So how can you help protect your business? The cost of cyber-crime Cyber-crime is rising at such an alarming rate you can no longer afford to ignore it [...]

24 10, 2016

Dyn DNS DDoS – understanding the cyber security terminology!

By | 2016-10-26T08:45:37+00:00 October 24th, 2016|Security|0 Comments

I’ll refrain using the term cyber security for the rest of this blog, let’s face it – it’s so 1990s!  Which brings me neatly to my first point – IT security the hardest part is understanding the terminology! Denial of Service - DoS This weekend’s cyber (damn, didn’t mean to use that -Ed) attack on [...]

31 05, 2016

Unleashed Guide to Ransomware

By | 2016-10-26T08:45:38+00:00 May 31st, 2016|Business Continuity, Security|0 Comments

What is Ransomware? Ransomware is not new and the first cases of CryptoLocker started back in 2013 and most attacks tends to come for outwith the UK.  Ransomware has now become so fruitful that many cyber criminals are now running it as a business!  To the extent of selling lists of infected and vulnerable PC's and Servers to [...]

23 05, 2016

Unleashed Guide to Secure your Wi-Fi

By | 2016-10-26T08:45:38+00:00 May 23rd, 2016|Uncategorized|0 Comments

It has been estimated that 63% of the Internet traffic worldwide will be sent by Wi-Fi by 2019. So is your Wi-Fi Secure? So what are the drivers for more Wi-Fi? Increased workplace productivity – Wi-Fi allows your business users to work in any location at any time. Cost – in smaller businesses it is [...]

12 04, 2016

Unleashed Guide to Virus Attacks

By | 2016-10-26T08:45:40+00:00 April 12th, 2016|Business Continuity, Disaster Recovery, Security, Uncategorized|0 Comments

Why is it that computer users are getting virus attacks by cyber criminals? The short answer is because they can and we make it easy for them. In this article I want to concentrate on Malware or Ransomware attacks. The days of simple malware being developed to cause a bit of mischief have long gone. [...]

1 02, 2016

Help to mitigate cyber attacks

By | 2016-02-01T17:02:47+00:00 February 1st, 2016|Security|0 Comments

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

12 01, 2016

Strange start to 2016! Cyber Essentials and more.

By | 2016-10-26T08:45:43+00:00 January 12th, 2016|Security|0 Comments

I would like to wish all our regular and new readers a very Happy New Year. It has been a strange start to 2016, we finished off last year relatively quiet, which was nice, but 2016 has gone off like a rocket and long may it continue. Yes, we are still working on a lot [...]