The Evolution of Cyber Security

Cyber Security has not always been a high priority among businesses. However, with the growing threat and proven damage showing among high profile companies and services like TalkTalk, Equifax, Yahoo and even the NHS has shone light on how Cyber Security should be taken very seriously. Businesses, regardless of their size, are now catching on
-> Continue reading The Evolution of Cyber Security

British Airways Data Breach

Álex Cruz, Chief Executive and Chairman of British Airways has described the recent data breach on ba.com and the mobile app as a “sophisticated, malicious criminal attack”. Although the breach was similar to the attack on Ticketmaster earlier this year, the criminals were able to access BA’s site directly rather than compromising a third-party system.
-> Continue reading British Airways Data Breach

Third Intel Computer Chips Exploit

In August, researchers found the third significant security flaw from Intel computer chips exploit this year which is known as the Foreshadow. The US government’s body for cyber security has identified the Foreshadow exploit to have vulnerabilities that could have been exploited to gain access to sensitive information. This is a similar vulnerability to the
-> Continue reading Third Intel Computer Chips Exploit

Protect your data!

In recent news, documents have been found for sale on the dark web containing sensitive information relating to the U.S. Air Force. These documents were featured for as low as $100 to $200 and were found by Information Security Analysts while trawling through the dark web searching for criminal activity. These analysts posed as potential
-> Continue reading Protect your data!

Smart Locks

Tapplock is a popular, Bluetooth-based, fingerprint activated padlock. The speciality of this padlock comes down to the fingerprint recognition technology which allows users to unlock the padlock with their fingerprint or use a mobile application remotely. As an added benefit, you can even allocate trusted individuals who can also use the mobile application to unlock
-> Continue reading Smart Locks

Wi-Fi EasyMesh

Mesh networks make use of multiple Wi-Fi enabled routing devices to extend a Wi-Fi network across a much larger area, for example it is common for users who live in large houses to lose Wi-Fi signal due to the lack of range provided by a single Wi-Fi hotspot alone. The benefits of using a mesh
-> Continue reading Wi-Fi EasyMesh

Is Virtual Reality Secure?

Virtual Reality (VR) is a technology that has become increasingly popular in the last few years, allowing users to become immersed in a virtual world of their choice from the comfort of their home. But is it secure? VR Technology requires users to have a VR Headset and Controllers which vary in levels of sophistication,
-> Continue reading Is Virtual Reality Secure?

Smart Watch-out!

In our previous blog, we spoke about the positives and negatives of using a smartwatch for your daily activities. Smartwatch security is a topic overlooked by most, and why? What potential does a smartwatch really hold? Let’s consider the core functionality a smartwatch. That is: to make calls, track health, send messages and access the internet.
-> Continue reading Smart Watch-out!

The Rise of Ransomware

Ransomware is being used widely by hackers to make money by holding your data hostage. As this threat evolves, can you be certain that the data you store is protected and are you able to recover it if you are attacked? This blog will cover ways to reduce the impact of ransomware by implementing practical
-> Continue reading The Rise of Ransomware