Where to Start Cyber Security Training

Cyber security consists of processes and technologies designed to protect systems, networks, people and data from cyber attacks. In the UK, whether at home or at work, the majority of us are reliant on digital communication and online services, and this can result in an exposure to cyber security risks. Although the impact of cybercrime
-> Continue reading Where to Start Cyber Security Training

The Evolution of Cyber Security

Cyber Security has not always been a high priority among businesses. However, with the growing threat and proven damage showing among high profile companies and services like TalkTalk, Equifax, Yahoo and even the NHS has shone light on how Cyber Security should be taken very seriously. Businesses, regardless of their size, are now catching on
-> Continue reading The Evolution of Cyber Security

Internet of things (IOT) Security

The Internet of Things encompasses everything that is connected to the internet, ranging from smart toasters which will send a notification to your phone when the bread is finished toasting, to devices that can monitor anything from your blood pressure, heart rate or even your pace maker. All of these devices collect and share data
-> Continue reading Internet of things (IOT) Security

Third Intel Computer Chips Exploit

In August, researchers found the third significant security flaw from Intel computer chips exploit this year which is known as the Foreshadow. The US government’s body for cyber security has identified the Foreshadow exploit to have vulnerabilities that could have been exploited to gain access to sensitive information. This is a similar vulnerability to the
-> Continue reading Third Intel Computer Chips Exploit

iOS Trustjacking

iOS Trustjacking is a new vulnerability which allows attackers to exploit the iTunes Wi-Fi sync feature. Designed to allow users to manage their iOS devices without requiring a physical connection to a computer, this feature can be manipulated by attackers to acquire persistent control over the victim’s device. So how does Trustjacking work? Firstly, the
-> Continue reading iOS Trustjacking

The Networks & Information Systems Directive (NISD)

The Networks and Information Systems Directive, more commonly referred to as the NIS Directive, is a law that was introduced on 9th May this year. The purpose of this directive is to improve the security of businesses providing essential services such as energy, transport, banking and healthcare. NISD also applies to businesses providing critical digital
-> Continue reading The Networks & Information Systems Directive (NISD)

Farnborough Airshow

borwell team support Farnborough Airshow 2018

Visualisation Project for the Farnborough Airshow flying committee The borwell team had a part to play in the Farnborough Airshow 2018. A team from the QinetiQ Farnborough site commissioned the borwell team to produce a front-end software display, to provide Situation Awareness to the Flight Safety Team responsible for the Airshow. The QinetiQ team provided
-> Continue reading borwell team support Farnborough Airshow 2018

Third-Party Gmail Applications

As of last year, Google pledged to stop collecting data from Gmail user’s inboxes to fuel targeted advertisements. However, this does not apply for the third-party developers that create apps and extensions for Gmail. Google claims that all third-party app developers and companies are examined before granting them access to the Gmail service, and that swift action is taken in any instances of poor or unclear practice from
-> Continue reading Third-Party Gmail Applications

Person eye with tech information overlaying

How Can Collaborative Working Help Your Business?

Internal Collaboration Collaborative working defined is the act of two or more people or organisations working together for a specific goal that is of benefit to the business. Collaborative software is best described as application software designed to help those involved in a common task achieve a common goal, i.e. a platform all parties can
-> Continue reading How Can Collaborative Working Help Your Business?

Eye with data graphic overlaying

How Visualising Data Can Add Value To Your Business

Humans, as a species are visual creatures by nature, 90% of the information transmitted to the brain is visual. Most often, visuals are committed to long term memory easier than text, visuals are read quicker than text and 40% of our sense processing is visual. Displaying data in a visual format can help people process
-> Continue reading How Visualising Data Can Add Value To Your Business