It couldn’t have happened to a nicer bunch of cybercriminals
Reading Time: 3 minutes The world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
CNC House
Lady Bee Enterprise Centre
Albion Street
Southwick
BRIGHTON
BN42 4BW
Reading Time: 3 minutes The world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
Reading Time: 3 minutes Southern Water now admits that as many as half a million customers’ personal information may have been stolen in the recent cyber attack.
Reading Time: 4 minutes Phishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.
Reading Time: 3 minutes Southern Water confirms network breach, as cybercriminals Black Basta attempt to hold the UK utility to ransom as they threaten to release data.
Reading Time: 3 minutes You go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.
Reading Time: 2 minutes Lush the cosmetics store, home to some of the most beautiful fragrances in the high street, has announced on its website, that it had been the victim of a cyber security incident.
Reading Time: 4 minutes Ransomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
Reading Time: 5 minutes In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape
Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
Reading Time: 4 minutes Michael Caine, Cameron Diaz, Will Smith, Barbara Streisand, Patrick Swayze, (that’s not fair), Halle Berry and even Robert de Niro have won one. ‘The Golden
Reading Time: 4 minutes Mobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources
Reading Time: 4 minutes Not quite the opening line of Hamlet, Act 1 Scene 1. However, in Shakespeare’s version as Bernardo looks out from the misty battlements, high up
Reading Time: 4 minutes Wi-Fi is everywhere. Buses, trains, cafes and pubs of course. It’s at the gym, taxis, shopping centres, the list goes on. Hold on a minute,
Reading Time: 4 minutes The news is full of it at the moment; a recession is just around the corner. ‘The recession we have been dreading is about to
Reading Time: 5 minutes In its purest form, DDoS stands for Distributed Denial of Service. A DDoS attack is a combined cyber attack on a specific server or network,
Reading Time: 2 minutes Beware of people posing as someone else online – it’s a growing threat to individuals and businesses. The phenomenon has been known as ‘catfishing’ for
Reading Time: 2 minutes There’s a lack of cyber security expertise and insufficient expenditure in many organisations which makes them more vulnerable to cyber-attacks. One of the most vulnerable
Reading Time: 2 minutes The theft of up to 500 million customer records from the Marriott hotel group is a shocking reminder to everyone how vulnerable personal information is
Reading Time: 2 minutes Be warned against buying hardware from China, it could be fitted with extra micro-chips designed to break into your organisation. The threat from technology built
Reading Time: 2 minutes A massive breach of security at British Airways, which compromised 380,000 card payments, shows that organisations of all sizes are vulnerable to cyberattacks if their
Reading Time: 2 minutes Chilling new research reveals cyber criminals are outspending big businesses and posing an ever-increasing threat to UK companies. The survey commissioned by software company Carbon
Reading Time: 2 minutes Companies should be aware of the hidden security threat from fax machines which are an unlocked backdoor for criminals. New research from Check Point Security
Reading Time: 2 minutes Companies need to protect their people and systems against hacktivism because it can compromise their networks. Worse still, it can be a cover for cyber
Reading Time: 2 minutes A data breach that occurred two years ago has now cost Uber its licence to operate a taxi-hailing service in Brighton. It’s a perfect example
Reading Time: 2 minutes The launch of a new security standard for wi-fi connectivity will make remote access much safer. Version three of Wi-Fi Protected Access (WPA3) follows research
Reading Time: 2 minutes Two-factor authentication is now essential to beat cyber criminals.
Reading Time: 2 minutes Beware of social engineering by cyber criminals. It’s an ever-growing threat to businesses worldwide.
Reading Time: 2 minutes Loss of emails can badly affect operational effectiveness and could breach data protection law if the lost correspondence contains customer records.
Reading Time: 2 minutes Phishing attacks by cyber criminals are becoming much more difficult to spot and many people are still being duped into taking the bait.
Reading Time: 2 minutes Many victims of ransomware attacks are turning to No More Ransom to have their data unlocked for free but the best way to beat cyber crime is by improving IT security.
Reading Time: 2 minutes Cyber-crime is now such a major threat to UK businesses that many companies will soon have to prove they are properly protected to avoid losing key contracts.
Reading Time: 2 minutes Many growing companies are choosing Microsoft 10 Enterprise because of the enhanced security it offers.
Reading Time: 2 minutes Many companies think they have good IT security to protect them from external attacks but are still vulnerable to insider threats.
Reading Time: 2 minutes Too many businesses are lazy about passwords and risk being hacked. They are in danger of losing vital data and badly damaging their reputation.
Reading Time: 2 minutes Whaling on the oceans may be a thing of the past in most countries but it’s now a major threat in the cyber world.
Reading Time: 2 minutes If you’re serious about selling services to major organisations then you need to have ISO27001.
Reading Time: 2 minutes Businesses across Sussex are being warned about ransomware which invades IT systems often via infected email attachments.
Reading Time: 2 minutes Companies that are still using older versions of Microsoft’s Internet Explorer must upgrade as soon as possible.
If they don’t, their systems will be vulnerable to attack.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category . |
cookielawinfo-checkbox-functional | 1 year | The cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category . |
cookielawinfo-checkbox-others | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Others". |
cookielawinfo-checkbox-performance | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Performance". |
CookieLawInfoConsent | 1 year | Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. |
elementor | never | This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_20840989_1 | 1 minute | Set by Google to distinguish users. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |