Category Archives: - it security

Cyber Security & Data Protection

Share this story

If we were to ask you to define cyber security, what would you say? You understand the concept but need to know more?

The definition of Cyberspace is an electronic medium of digital networks used to store, modify and communicate information. Cyberspace influences and makes a big impact on our lives, our businesses and services. You would assume that your personal information in cyberspace would be secure and protected. We are all aware that isn’t the case in reality.

The UK government are making on-going transformations to protect UK citizens and businesses. They have a mission to protect people from threat actors that use data for inappropriate, malicious and illegal purposes.

Cyber Security plays a massive part in the private and public sector. From national security, the fight against terrorism, crime or industrial devastation for example. Cybercrime is an everyday occurrence. The risks of storing data in Cyberspace are huge but necessary and protective security measures should be taken.

Being Secure Online in Business

Security threats build and the government need to step up their game.  They are attacking the problem but is it enough? It’s not solely just up to the government to sort the problem. It is the responsibility of companies and us as a country.

Cyber Security is a topic that we should educate ourselves about. Who and what are we dealing with when it comes to cyber security and data protection?

  • The cyber space pirates – this includes hacktivists groups and terrorists. Their resources, accessibility and capabilities are huge. They have the ability to cause carnage on computer networks. Targeting the government, the military, businesses and individuals
  • Cyber space crime is an extension of normal crime. The difference is, the pirates don’t need to be in the location of the crime to do the deed. It’s a crime that can be free, cheap and on a massive catastrophic scale
  • The heartless pirates can use software (malware) to demolish cyber infrastructure. This could be as simple as taking a website offline or just damaging infrastructure. A process known as CAN (Computer Network Attack)

Businesses have a responsibility to their customers to keep their data safe, as well as to shareholders and investors to remain competitive in a global marketplace.

The new GDPR due to come into force in May 2018 will help tackle the data protection issues. **Insert a link to your GDPR articles. You could make reference to some key points. The government are trying to build a country where people know that there data is protected and they can move forward with confidence to use the internet.

How are the government going to deal with cyber security and data protection?

  • Attacking the problem and the source
  • Making businesses realise their responsibilities when it comes to data protection
  • The government will educate organisations so they know how to protect the data
  • A realisation that so far, the government’s effort to deal with the issue has been insufficient
  • Efficient cyber security risk management is vital
  • There needs to be compliance or there will be a fine!
  • There will be a regular review of the challenges
  • The government will get a better understanding of cybercrime and deliver programmes
  • They should be aware of the constant threat changes
  • Cyber insurance policies should be available to an organisation to cover them against a range of cyber risks

Send mixed messages: Mozilla wants you to try its encrypted file sharing

Share this story

Interesting new Send service being tested by Firefox.
Businesses we deal with dislike this type, due to the lack of auditability, of sending service, but the industry is screaming out for a standard file share/sending type of service.

There are vendors available, of course, but different businesses use different vendors – perhaps its time to look at TLS on email and increase the storage space the receiving capacity of email in general.

Twenty-five Percent of Emails Deemed Unsafe – Dark Reading

Share this story

A short video from Mimecast showing, from their recent Security report, that they deem around 25% of emails to be unsafe. Not surprising, and I would have put this figure, personally, a lot higher than this, considering that, by a fair percentage, a popular attack vector for users is through email.

Even with education, anyone can make an error by clicking on a malicious link or file in an email.

Do you use a cloud filtering service ? There are clear benefits of doing so, even more so if your email is housed internal to your business.

“Petya” Ransomware Goes Global

Share this story

“Petya” Ransomware goes Global

There is a new strain of Ransomware from its original called Petya. Some sites out there are calling it completely new, NotPetya, and others see it is a variant and calling it PetWrap.

Whatever the case, the advice is always the same, look at how this is reportedly spreading, and put measures in place to mitigate as much as you possibly can.

According to many reports, the Ukraine has been badly hit, and it has been seen in several high profile UK business organisations.

Its also been confirmed that this Ransomware uses the Eternal Blue exploit, which was originally thought to have been developed by the US NSA as a digital weapon, and then subsequently leaked online by the hacker group known as Shadow Brokers.

Businesses who have not put measures in place such as disabling the SMB version 1 protocol (deprecated) or implemented the MS17-010 Microsoft Patch should do so now or as soon as possible. We believe this wont be the last exploit of this nature, and although simple measures such as black-holing the domain name used for the original Wannacry outbreak, and blocking known C&C servers, wont be effective and you could be fighting a reactive battle.

Businesses need to be robust in their security measures, have a solid response plan and be reactive as they can be to these modern threats otherwise these strains will continue to develop and proliferate. Don’t delay security patching.

What can you do ? Read the full article below – or contact us today.

Confirmed: Intel patches remote execution hole that’s been hidden in its…

Share this story

Intel have confirmed that a patch will be released that will fix a remote code execution vulnerability (discovered in March 2017) which has been in its processors since 2009. This vulnerability allows hackers exploiting the flaw to silently snoop on a vulnerable machine’s users, make changes to files and read them, install rootkits and other malware, and so on. This is possible across the network, or with local access. #ITSecurity


Share this story

Ransomware cybercriminals took in about $1 billion last year, based on money coming into Ransomware-related Bitcoin wallets. #Ransomware