The True Cost of a Cyber Security Breach

Do I really need to worry about a potential cyber attack?  The majority of business owners will realise a cyber security breach within their organisation will result in some negative outcomes. Most business leaders will automatically understand that some of these outcomes will likely result in a negative financial impact on their organisation, but the
-> Continue reading The True Cost of a Cyber Security Breach

Our cyber team launches affordable new monthly packages

As a busy business owner, IT systems, and cyber security are not at the top of your agenda. However, you will be aware that cyber security is important. If you are from outside the tech sector, or your skills are stronger in other areas, tackling such a project can be daunting. It’s likely you are
-> Continue reading Our cyber team launches affordable new monthly packages

Agritech

Space, GIS & Cyber: applications in agri-tech

During May this year the borwell team prepared  a series of  presentations which investigated data & GIS, security, and innovation in Agritec in collaboration with Pershore College. We sought to provide an answer as to why we need to be precise in Agritech and to explore the impact of being secure, and innovative.   The first
-> Continue reading Space, GIS & Cyber: applications in agri-tech

The Evolution of Cyber Security

Cyber Security has not always been a high priority among businesses. However, with the growing threat and proven damage showing among high profile companies and services like TalkTalk, Equifax, Yahoo and even the NHS has shone light on how Cyber Security should be taken very seriously. Businesses, regardless of their size, are now catching on
-> Continue reading The Evolution of Cyber Security

British Airways Data Breach

Álex Cruz, Chief Executive and Chairman of British Airways has described the recent data breach on ba.com and the mobile app as a “sophisticated, malicious criminal attack”. Although the breach was similar to the attack on Ticketmaster earlier this year, the criminals were able to access BA’s site directly rather than compromising a third-party system.
-> Continue reading British Airways Data Breach

Third Intel Computer Chips Exploit

In August, researchers found the third significant security flaw from Intel computer chips exploit this year which is known as the Foreshadow. The US government’s body for cyber security has identified the Foreshadow exploit to have vulnerabilities that could have been exploited to gain access to sensitive information. This is a similar vulnerability to the
-> Continue reading Third Intel Computer Chips Exploit

Protect your data!

In recent news, documents have been found for sale on the dark web containing sensitive information relating to the U.S. Air Force. These documents were featured for as low as $100 to $200 and were found by Information Security Analysts while trawling through the dark web searching for criminal activity. These analysts posed as potential
-> Continue reading Protect your data!

Smart Locks

Tapplock is a popular, Bluetooth-based, fingerprint activated padlock. The speciality of this padlock comes down to the fingerprint recognition technology which allows users to unlock the padlock with their fingerprint or use a mobile application remotely. As an added benefit, you can even allocate trusted individuals who can also use the mobile application to unlock
-> Continue reading Smart Locks

Wi-Fi EasyMesh

Mesh networks make use of multiple Wi-Fi enabled routing devices to extend a Wi-Fi network across a much larger area, for example it is common for users who live in large houses to lose Wi-Fi signal due to the lack of range provided by a single Wi-Fi hotspot alone. The benefits of using a mesh
-> Continue reading Wi-Fi EasyMesh

Is Virtual Reality Secure?

Virtual Reality (VR) is a technology that has become increasingly popular in the last few years, allowing users to become immersed in a virtual world of their choice from the comfort of their home. But is it secure? VR Technology requires users to have a VR Headset and Controllers which vary in levels of sophistication,
-> Continue reading Is Virtual Reality Secure?