At the recent East Midlands Cyber Security Forum (EMCSF), I was fortunate enough to have the opportunity to chair a panel session on the topic of ransomware. Continue reading “3 key ways to stop ransomware”
In a previous blog post I wrote about the rise of ransomware over the last year. In this post I will briefly outline what steps organisations should take to avoid becoming the next victim of ransomware. Continue reading “How can firms protect themselves from ransomware?”
I recently attended the East Midlands Cyber Crime Breakfast, where a panel of experts outlined what they saw as the principal cyber crime threats that were affecting organisations in the East Midlands. Continue reading “Top cyber crime threats to East Midlands businesses”
Computer hacking has evolved considerably over the past 20 years. What was once a “hobby” to demonstrate technical prowess, by breaking into systems and putting graffiti on web sites, then evolved into stealing as a way of gaining criminal financial reward. Continue reading “What is ransomware?”
If your web browser is too old, you will not be able to access sites using strong security.
If your web browser is too new, it will prevent you accessing sites with weaker security.
So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too secure. Continue reading “Is your browser in the Goldilocks zone?”
With the recent events and stories hitting the news, such as CES 2016 announcing plenty of new IoT products and new toys being hackable, no wonder I couldn’t miss the opportunity to talk about them – the first thing to catch my eye this week was ……
In an important Juniper security announcement last month it was revealed that:
“During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections.” Continue reading “Could PAS 754 have helped Juniper?”
Over the last few days, many children will have received gifts of the latest interconnected toys. Sadly as a security community we know many of these will be insecure. Continue reading “Is your New Toy Hackable?”
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading “Firestorm – how to avoid the latest Next Generation Firewall vulnerability”