Security blogs

NCSC Warns Of Rising Office 365 Account Compromises

What is happening? NCSC recently published an Advisory regarding several incidents involving compromise of Office 365 user accounts within the UK and using them in targeted supply chain attacks. To be clear, this is not a vulnerability in Office 365.  NCSC are highlighting that O365 users are being increasingly targeted by attackers given its [...]

2019-01-15T16:55:00+00:00 January 8th, 2019|Security blogs|0 Comments

The Human Factor In Cyber Security – Malicious Third Parties

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose [...]

2019-01-08T11:21:11+00:00 January 8th, 2019|Blog, Security blogs|0 Comments

The Enemy Within: Five Things To Know

  It’s tempting, when considering cybercriminals, to visualise shadowy figures hunched over dimly lit keyboards in some distant location. The reality is altogether more concerning. The greatest threats to your enterprise’s cybersecurity are probably much closer to home. The individual about to be responsible for a data breach costing your organisation millions, and inflicting [...]

2018-12-17T14:04:55+00:00 December 17th, 2018|Blog, Security blogs|0 Comments

Ensure Employees Are The First Line Of Defence In Your Cyber Resilience Plan

It’s often said that people are your organisation’s weakest link, and that’s true up to a point. But with the right employee training, they could also be a great first line of defence. When combined with the right security tools, techniques and processes, you could do enough to deter all but the most determined [...]

2018-12-10T14:22:04+00:00 December 10th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Benign Third Parties

  About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose [...]

2018-12-07T11:11:15+00:00 December 7th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Developers

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-12-06T12:22:21+00:00 December 6th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Malicious Insiders

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-11-23T13:29:49+00:00 November 23rd, 2018|Security blogs|0 Comments

How Hackers Can Take Down Critical Energy Systems Through The Internet?

Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected systems, especially through the integration of industrial internet of things (IIoT) technologies. This continuing [...]

2018-11-15T11:24:50+00:00 November 15th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – IT Administrators

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-11-13T11:47:44+00:00 November 13th, 2018|Security blogs|0 Comments

600,000 breached company email credentials available on dark web

Latest News Recently it has been discovered that over 600,000 breached company email credentials from the UK’s leading construction, architecture and property firms are readily available on the dark web. Of the email credentials available, more than 450,000 of the breached credentials were from the UK’s leading construction firms. 110,000 were linked to top [...]

2018-11-01T15:25:31+00:00 November 1st, 2018|Blog, Security blogs|0 Comments