WordPress Security Solutions
A website is often the front door to a business yet if not kept under control is easily compromised. WordPress is the most popular …
The Case For Legitimate Hacking
CyberUp is a campaign dedicated to updating the UK 1990 Computer Misuse Act to reflect modern computer security systems and how they are protected …
Google Search Vulnerabilities
Dorking is a legal but specialised sub-set of Google searching Google dorks are keyword searches that look for specific website content rather than searching …
Is CAPTCHA Redundant?
Is CAPTCHA Redundant? Automated routines aim to prevent bots flooding websites with unwanted activity but also drive away regular users and are readily bypassed …
Insider Threats
Insider Threats Social media is being used to entice loyal employees to reveal sensitive data An insider threat assumes that someone within an organisation …
Password Theft
Password Theft Passwords and accounts may be initially harvested by phishing or spoof websites. This is only the beginning of a well-established trade network …
Privileged Access Management
Privileged Access Management Privileged Access Management (PAM) builds on the base IT Security concept that a user should have the minimum privileges to do …
Artificial Intelligence and Network Security
Artificial Intelligence and Network Security How can Network security systems learn to identify when network traffic deviates from ‘normal’? Artificial Intelligence (AI) and Machine …
Battling the Botnets
Battling the Botnets Harmful botnet traffic may be approaching 20% of Internet traffic Botnets are not necessarily a bad thing. Consider a SIEM (Security …
Tracking Cryptocurrency Scams
Tracking Cryptocurrency Scams Scammers are demanding payment in cryprocurrency but the nature of Blockchains means these transcations can be traced. Bitcoin and other cryptocurrency …
Changes to EU and UK NIS Cyber Security Legislation
Changes to the Directive on Security of Network and Information Systems The European Parliament has agreed on the concept of a new security law, …
Unifying Physical and Cyber Security
Unifying Physical and Cyber Security Data from physical security systems should not be seen as separate to that from network monitoring. A web search …
Running a Successful Phishing Simulation
Running a Successful Phishing Simulation Simulating a phishing attack can be part of staff security training and will increase awareness of genuine phishing threats. …
Calculating the Cost of a Databreach
Estimating the cost of data breaches. UK government studies aim to identify the financial costs of dealing with a data breach. The full financial …
Janet Updates Security Requirements
Janet Updates Security Requirements JANET (Joint Academic Network) is the computer network backbone used by UK Universities, Colleges and research centres. Updates have been …
Reacting to Ransomware
Reacting to Ransomware Ransomware continues to be a major threat to computer systems. Attacks on high profile users make the news headlines but there …
Ukrainian Cyber Threats
Ukrainian Cyber Threats The current (March 2022) conflict between Ukraine and Russia is expanding into cyberspace and may affect computer systems Worldwide Politically motivated attacks …
Zero Trust Security
Zero Trust Security Zero Trust is not a single off the shelf solution. It is best thought of a buzzword that describes a strategy …
Nation State Cyber Attacks
Nation State Cyber Attacks No target is too insignificant for the big player hackers. Compared to the costs of conventional weapons; cyber is a …
Passwordless Authentication
Passwordless Authentication The need to remember and input passwords to access data may be coming to an end Passwords are a core issue in …