Mirror mirror on the wall, who’s the fairest Application and OS of them all

The Computer Vulnerabilities and Exposures (CVE) website provides yearly summaries of application and operating systems vulnerabilities. Having a vulnerability is not the same as it actually being exploited, but the figures provide a useful, if somewhat crude way, of identifying what needs protecting and how this compares to 2015. For anyone that doesn’t want to read much further the… Read More

Is cyber crime a threat to SMEs?

With reports of SMEs averaging four cyber crimes every two years and 10% of the population being victims in the past year, it has to be seen as a real threat. But what does this actually mean to a business? The first thing to do is get beyond jargon like phishing, ransomware and DDoS attacks. Cyber… Read More

How to survive being number 1

A report has the UK as being number 1. Which you would think is a good thing, but not when it is the number 1 target for spear phishing attacks by cyber criminals. Watch our video for more details.

Can I please have your personal information? OK!

What would you do if someone came up to you, leaned over and whispered in your ear can I please have your personal information? Personally, I would tell them to go away, possibly using words a bit stronger than that, and walk away. But every day people are saying it is OK for someone they… Read More

Public WiFi good practice

Keeping up-to-date with emails and social media is an essential part of running a business. When there is no access from our phones, or a faster connection is needed, we switch to WiFi. In many cases, this will be a public WiFi network rather than a private one. Once you are connected the risks of… Read More

The man, the cloud and the social rat

After a recent talk I gave on Information Security one of the attendees thanked me for explaining what it meant and then asked for more information about some of the attacks. So here are explanations about some of the attacks used in the talk, and a few more that I will be talking about in the… Read More

Information Security – don’t forget about paper

Over the past few weeks, I have been talking to a lot of small businesses about Information Security. Every time I get a reaction along the lines of ‘it’s an IT issue’. That is part of it, but information exists in different formats and media, and anything sensitive needs protecting. What you need is a good… Read More

Actions taken against servers and mobile devices

A report by the Aberdeen Group on full-disk and file-level encryption includes information on actions taken against servers and endpoints. An endpoint being a laptop, mobile device, removable media etc.  Although there is nothing totally unexpected in the figures, it helps to have this type of information to show senior management where threats are coming… Read More