Security

/Security
19 09, 2018

Cyber Kill Chain

By |2018-09-19T12:17:09+00:00September 19th, 2018|Cyber Security, GDPR, Security, Unleashed|0 Comments

What is the cyber kill chain? To explain what this is, we first have to look at the whole process of the cyber-attack. To stop a cyber-attack, you first have to understand the process that the purveyor of the attack goes through. And, more importantly, know what the end goal of the attack is. There [...]

7 06, 2018

Data Security Strategy

By |2018-06-07T15:06:09+00:00June 7th, 2018|Cyber Security, Disaster Recovery, GDPR, Security, Unleashed|0 Comments

How many businesses have a data security strategy? My guess would be not many. Why? because not many people really understand how to protect their data against the three main data security risks: Security Risks: 1.       Outsider – Malicious threat where someone will try to attack your business, normally to steal data for monetary gain. [...]

27 11, 2017

Insider Threat

By |2018-04-24T21:20:43+00:00November 27th, 2017|Cyber Security, Security|0 Comments

The insider threat is real and it will cost your business. There are two types of insider threat, accidental and malicious. For a cyber-criminal to access your data, they must have access to your network. This is obtained by using compromised user credentials, and can be an employee, contractor, partner or vendor who has access [...]

10 10, 2017

GDPR, Confused?

By |2017-10-10T13:27:59+00:00October 10th, 2017|Cyber Security, Infrastructure, Security, Technology, Unleashed|0 Comments

GDPR, Confused? Well everyone I have spoken to certainly is! In fact, it has taken me nearly 3 months to get to the bottom of what IT Directors/Managers have to do to ensure you are GDPR (General Data Protection Regulations) compliant. In one sense it is quite funny that the search term GDPR, Confused? Gets [...]

26 06, 2017

The certifiable way to become CISSP certified!

By |2017-06-26T09:05:54+00:00June 26th, 2017|Security|0 Comments

Well it’s official, the ISC2 have finally bestowed upon me the prestigious CISSP (Certified Information Systems Security Professional) accreditation! I started my journey almost two years ago, just as the new 8 domain material came out.  Despite taking two years to sit the exam (will tell you why later), I managed to pass first time!  [...]

13 05, 2017

What IT Managers should be doing about the NHS Cyber Attack

By |2017-05-13T10:22:52+00:00May 13th, 2017|Security|0 Comments

NHS Cyber Attack Yesterday, the 12th of May 2017, there was what the media are calling a 'massive cyber attack' against the NHS.  I'm in agreement with a former leading figure at GCHQ, Brian Lord, who was interviewed on BBC Breakfast News this morning.  He stated that calling this a 'cyber attack' is somewhat misleading and [...]

12 05, 2017

What the heck is GDPR and why should an IT Manager care?

By |2017-05-12T15:59:08+00:00May 12th, 2017|Security|0 Comments

Here’s the scene Everyone and their dog in IT reseller land is sending you out hundreds of emails a week about GDPR. You’ve got users with problems breathing down your neck who won’t leave your desk until you’ve reset their password, which if they’d only just remember them you’d get some work done. You’ve also [...]

8 05, 2017

The differences between GDPR and Data Protection Act?

By |2017-05-08T13:27:43+00:00May 8th, 2017|Security|0 Comments

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. [...]

1 03, 2017

Why I hate the term cybersecurity

By |2017-03-01T18:30:48+00:00March 1st, 2017|Security|0 Comments

Cybersecurity and Cyber I’m going to start by saying the terms ‘cyber’ and ‘cybersecurity’ grate on me, a lot.   Seriously, it was the mid-90’s when ‘Cyberbob’ conned the rather lovely Sandra Bullock in The Net.  It was cringe worthy then - and its cringe worthy now. Hackers may have been a bit of a cooler [...]

7 02, 2017

Your network will be attacked

By |2017-02-07T15:35:55+00:00February 7th, 2017|Security|0 Comments

It is predicted that 2017 will be the year of cyber-crime. Attacks will increase and one thing is for sure, your network will be attacked at some point. So how can you help protect your business? The cost of cyber-crime Cyber-crime is rising at such an alarming rate you can no longer afford to ignore it [...]

24 10, 2016

Dyn DNS DDoS – understanding the cyber security terminology!

By |2016-10-26T08:45:37+00:00October 24th, 2016|Security|0 Comments

I’ll refrain using the term cyber security for the rest of this blog, let’s face it – it’s so 1990s!  Which brings me neatly to my first point – IT security the hardest part is understanding the terminology! Denial of Service - DoS This weekend’s cyber (damn, didn’t mean to use that -Ed) attack on [...]

31 05, 2016

Unleashed Guide to Ransomware

By |2016-10-26T08:45:38+00:00May 31st, 2016|Business Continuity, Security|0 Comments

What is Ransomware? Ransomware is not new and the first cases of CryptoLocker started back in 2013 and most attacks tends to come for outwith the UK.  Ransomware has now become so fruitful that many cyber criminals are now running it as a business!  To the extent of selling lists of infected and vulnerable PC's and Servers to [...]

12 04, 2016

Unleashed Guide to Virus Attacks

By |2016-10-26T08:45:40+00:00April 12th, 2016|Business Continuity, Disaster Recovery, Security, Uncategorized|0 Comments

Why is it that computer users are getting virus attacks by cyber criminals? The short answer is because they can and we make it easy for them. In this article I want to concentrate on Malware or Ransomware attacks. The days of simple malware being developed to cause a bit of mischief have long gone. [...]

1 02, 2016

Help to mitigate cyber attacks

By |2016-02-01T17:02:47+00:00February 1st, 2016|Security|0 Comments

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

13 01, 2016

What does Brexit mean for UK Data Protection?

By |2016-10-26T08:45:42+00:00January 13th, 2016|Security|0 Comments

Brexit.  Leaving the EU and it’s laws.  As a long time geek I’ve had the principles of the UK Data Protection Act drummed into me since I studied GCSE IT. It is the foundation of how we lay out the responsibility and liability for the care of the personal data we share with companies and [...]

12 01, 2016

Strange start to 2016! Cyber Essentials and more.

By |2016-10-26T08:45:43+00:00January 12th, 2016|Security|0 Comments

I would like to wish all our regular and new readers a very Happy New Year. It has been a strange start to 2016, we finished off last year relatively quiet, which was nice, but 2016 has gone off like a rocket and long may it continue. Yes, we are still working on a lot [...]

18 11, 2015

Must have tools for ISO 27001 Compliance Projects

By |2017-04-07T12:27:17+00:00November 18th, 2015|IT Consultancy, Security|0 Comments

Here at Unleashed, we take a very different approach to what we do with ISO 27001 compliance.  There is a whole world of consulting around the ISO Management System Standards. This tends to focus on the compliance and adherence to the letter of the standards - paperwork, paperwork and more paperwork! Whilst the consultants are [...]

9 11, 2015

5 Factors that Could Affect Your IT Strategy

By |2017-04-07T09:52:03+00:00November 9th, 2015|IT Consultancy, Security, Smarter Working, Solutions, Technology|0 Comments

You've got the best IT strategy in the world, and that's a fact. It's genius, foolproof and will take my business into the 22nd century... At least, that's would you'd like to tell yourself. Maybe you already do, and that's wonderful. But let's dial it back a bit; no IT strategy is foolproof. There's always [...]

23 10, 2015

Yet Another Data Security Breach!

By |2017-04-07T09:11:46+00:00October 23rd, 2015|Big Data, Security|0 Comments

In a recent blog that we posted earlier this month, we told you that only 9% of your IT spend for next year would be on Security Software, given that yesterday another major security cyber-attack hit the headlines with Talk Talk experiencing what has been described as a "significant and sustained cyber-attack" - you may want to [...]

5 10, 2015

Your IT Strategy Solutions for 2016

By |2017-04-07T09:21:30+00:00October 5th, 2015|IT Consultancy, IT Support, Managed Services, Security|0 Comments

In this article, Unleashed has looked at the recent Spiceworks report on the State of IT for 2016 and picked out the highlights for your perusal, to hopefully inform your IT strategy solutions for the coming year. What do we think IT departments will be spending their money on in the next financial year? Despite [...]