Cyber Security

/Tag: Cyber Security
7 09, 2018

Why did the British Airways Data Theft Happen?

By |2018-09-07T15:02:02+00:00September 7th, 2018|Cyber Security|0 Comments

British Airways, or as us self-respecting Northerners call it - "Heathrow Airways" has suffered a large data theft.  This has come in a string of IT Debacles that have occurred over the last 18 months. In July, there were IT issues causing some flights in and out of Heathrow to be cancelled.   The month before, [...]

20 09, 2017

Dangers of Public Wi-Fi

By |2017-11-09T14:48:15+00:00September 20th, 2017|Cyber Security, Uncategorized|0 Comments

The Dangers of Public Wi-Fi is one of my hot topics of conversation at the many networking events in and around Glasgow that I attend. I have to say, I am becoming a bit paranoid about it, however, I make no apology for bringing it up. Why, you may well ask? Well, let’s cut right [...]

3 07, 2017

What makes a good Cyber Security Consultant?

By |2017-07-03T10:01:00+00:00July 3rd, 2017|Uncategorized|0 Comments

What makes a good cyber security consultant? As cyber-crime rises, it seems every IT person is now a cyber security expert. However, with so much information floating around how do you separate the wheat from the chaff? Well, Unleashed, is here to help you decide. As we have said many times, in various posts over [...]

27 06, 2017

What to do if you think you’re infected with ransomware

By |2017-06-27T21:11:04+00:00June 27th, 2017|Uncategorized|0 Comments

Not Petya We’ve had WannaCry, WannaCrypt, Petya and now Not Petya, all variants of a style of malware called crypto lockers.   Essentially software that gets onto your system and encrypts your files and stops you using them due to you not having the decryption key to open them. The term ransomware is used because affected [...]

26 06, 2017

The certifiable way to become CISSP certified!

By |2017-06-26T09:05:54+00:00June 26th, 2017|Security|0 Comments

Well it’s official, the ISC2 have finally bestowed upon me the prestigious CISSP (Certified Information Systems Security Professional) accreditation! I started my journey almost two years ago, just as the new 8 domain material came out.  Despite taking two years to sit the exam (will tell you why later), I managed to pass first time!  [...]

13 05, 2017

What IT Managers should be doing about the NHS Cyber Attack

By |2017-05-13T10:22:52+00:00May 13th, 2017|Security|0 Comments

NHS Cyber Attack Yesterday, the 12th of May 2017, there was what the media are calling a 'massive cyber attack' against the NHS.  I'm in agreement with a former leading figure at GCHQ, Brian Lord, who was interviewed on BBC Breakfast News this morning.  He stated that calling this a 'cyber attack' is somewhat misleading and [...]

12 05, 2017

What the heck is GDPR and why should an IT Manager care?

By |2017-05-12T15:59:08+00:00May 12th, 2017|Security|0 Comments

Here’s the scene Everyone and their dog in IT reseller land is sending you out hundreds of emails a week about GDPR. You’ve got users with problems breathing down your neck who won’t leave your desk until you’ve reset their password, which if they’d only just remember them you’d get some work done. You’ve also [...]

8 05, 2017

The differences between GDPR and Data Protection Act?

By |2017-05-08T13:27:43+00:00May 8th, 2017|Security|0 Comments

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. [...]

10 04, 2017

Examples of Cyber Attacks

By |2017-04-18T15:07:55+00:00April 10th, 2017|Uncategorized|0 Comments

We all know that cyber attacks are on the increase, but not many of us actually know what it is, or how it effects us. So, I would like to share two examples with you. Cyber Attacks Example  1 - Know who you are dealing with. A large UK multinational centralised their finance function. As part [...]

1 03, 2017

Why I hate the term cybersecurity

By |2017-03-01T18:30:48+00:00March 1st, 2017|Security|0 Comments

Cybersecurity and Cyber I’m going to start by saying the terms ‘cyber’ and ‘cybersecurity’ grate on me, a lot.   Seriously, it was the mid-90’s when ‘Cyberbob’ conned the rather lovely Sandra Bullock in The Net.  It was cringe worthy then - and its cringe worthy now. Hackers may have been a bit of a cooler [...]

7 02, 2017

Your network will be attacked

By |2017-02-07T15:35:55+00:00February 7th, 2017|Security|0 Comments

It is predicted that 2017 will be the year of cyber-crime. Attacks will increase and one thing is for sure, your network will be attacked at some point. So how can you help protect your business? The cost of cyber-crime Cyber-crime is rising at such an alarming rate you can no longer afford to ignore it [...]

24 10, 2016

Dyn DNS DDoS – understanding the cyber security terminology!

By |2016-10-26T08:45:37+00:00October 24th, 2016|Security|0 Comments

I’ll refrain using the term cyber security for the rest of this blog, let’s face it – it’s so 1990s!  Which brings me neatly to my first point – IT security the hardest part is understanding the terminology! Denial of Service - DoS This weekend’s cyber (damn, didn’t mean to use that -Ed) attack on [...]

31 05, 2016

Unleashed Guide to Ransomware

By |2016-10-26T08:45:38+00:00May 31st, 2016|Business Continuity, Security|0 Comments

What is Ransomware? Ransomware is not new and the first cases of CryptoLocker started back in 2013 and most attacks tends to come for outwith the UK.  Ransomware has now become so fruitful that many cyber criminals are now running it as a business!  To the extent of selling lists of infected and vulnerable PC's and Servers to [...]

23 05, 2016

Unleashed Guide to Secure your Wi-Fi

By |2016-10-26T08:45:38+00:00May 23rd, 2016|Uncategorized|0 Comments

It has been estimated that 63% of the Internet traffic worldwide will be sent by Wi-Fi by 2019. So is your Wi-Fi Secure? So what are the drivers for more Wi-Fi? Increased workplace productivity – Wi-Fi allows your business users to work in any location at any time. Cost – in smaller businesses it is [...]

12 04, 2016

Unleashed Guide to Virus Attacks

By |2016-10-26T08:45:40+00:00April 12th, 2016|Business Continuity, Disaster Recovery, Security, Uncategorized|0 Comments

Why is it that computer users are getting virus attacks by cyber criminals? The short answer is because they can and we make it easy for them. In this article I want to concentrate on Malware or Ransomware attacks. The days of simple malware being developed to cause a bit of mischief have long gone. [...]

1 02, 2016

Help to mitigate cyber attacks

By |2016-02-01T17:02:47+00:00February 1st, 2016|Security|0 Comments

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

12 01, 2016

Strange start to 2016! Cyber Essentials and more.

By |2016-10-26T08:45:43+00:00January 12th, 2016|Security|0 Comments

I would like to wish all our regular and new readers a very Happy New Year. It has been a strange start to 2016, we finished off last year relatively quiet, which was nice, but 2016 has gone off like a rocket and long may it continue. Yes, we are still working on a lot [...]