<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

Posted: 14 March 2018

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information security from time-to-time. As such, you probably get approached to opine on a summary of what frightens you the most, and how to drive to sum navigable preventative steps.

Read Article

GDPR: Seek re-consent or burn your contacts database, really?

Posted: 07 March 2018

So, you've been told that you need to destroy your prized contacts database unless you can prove that you have consent to process the personal data of those that you store. Maybe you can send out communication asking those contacts to re-consent... but how many would? And what about the problems which Honda incurred by doing this?

Read Article

Lead Acquisition at Events, GDPR Style

Posted: 28 February 2018

I am certain that there is likely to be nobody reading this blog who has never been to a trade fair or industry event. Huge gatherings of like-minded individuals, peers or even just the curious jostle past one another, between extravagant stands paid for vendors promoting their wares.

Read Article

5 Things to Know About the EU's Upcoming ePrivacy Regulation

Posted: 27 February 2018

With May 2018 within touching distance, you may think it will soon be all over. The GDPR (General Data Protection Regulation) is taking its toll and fatigue around the topic has undoubtedly begun to set in. Yet, it is only just the beginning, as one door closes another door opens, to make way for the European Union’s ePrivacy regulation.

Read Article

Don't let Cyberloafing Crush Productivity

Posted: 21 February 2018

What do you call it when users get online for some reason, find themselves on a part of the Internet that is not, strictly speaking, work related, and then find that an hour or more of productive time has been lost to the ether? Well, maybe what you call it is more accurate, but the worksafe word is “cyberloafing,” and it’s costing your business big money.

Read Article

What to do when you receive a "Withdrawal of Consent" under the GDPR

Posted: 14 February 2018

The GDPR (General Data Protection Regulation) is a complex beast, of which there seems to be an endless supply of regurgitated information online, in print and at various events. What is lacking however is practical information on how to handle its requirements operationally.

Read Article

WPA3: Is it just filling in the KRACK’s or do we finally have the wireless security we need?

Posted: 07 February 2018

At the recent Consumer Electronics Show (CES) the Wi-Fi alliance announced WPA3; a new security certification which promises to address the weaknesses of WPA2 and adds a range of much needed enhancements to wireless security.

Read Article

An Introduction to Operational Technology and it's Security: 5 Key Facts

Posted: 31 January 2018

The industrial revolution of the 18th century was famously invoked by a step up in technology. Industries which had traditionally relied on work by hand started to embrace a new future of machine use to dramatically enhance output levels, efficiency and financial return.

Read Article

What GDPR lessons can we learn from the Uber data breach?

Posted: 24 January 2018

Uber, the world's most famous disruptor of the taxi industry has never been short of controversy. Whether it be accusations of poor employment practices, sexual harassment at HQ or their never ending legal duels with various city councils, the workload for Uber’s public relations department is certainly colourful to say the least.

Read Article

Meltdown and Spectre: The Holy Grail of Vulnerabilities

Posted: 17 January 2018

Just when we thought it couldn’t get any worse, yet another vulnerability has been discovered, but this time embedded into physical hardware. The threat is so severe that if used correctly, a simple action like running a computer program could allow someone to steal sensitive information such as passwords and credit card details. And guess what? Not a single piece of IT security software will save us. But hey, there is a patch for it...

Read Article

December 2017: The Month in Ransomware

Posted: 10 January 2018

Ransomware activity was on a fairly high level till mid-December but slowed down by the end of the month, perhaps due to threat actors’ holiday spree. Some of the newsmaking events included the onset of the first-ever blackmail virus targeting network-attached storage devices, the breach of California’s voter database, and arrests of CTB-Locker and Cerber distributors in Romania.

Read Article

Everything You Need to Know About CCTV and the GDPR

Posted: 08 January 2018

'The devil is in the detail' is a phrase which comes to mind when speaking about the GDPR (General Data Protection Regulation). The obvious topics surrounding the application of the regulation's articles have been extensively discussed, leaving behind those tricky and often overlooked details.

Read Article

Do you know what "The Right to Forget" in GDPR terms really means?

Posted: 03 January 2018

Wherever there exists a conversation about the GDPR (General Data Protection Regulation), you can guarantee a handful of infamous topics are covered. The scaremonger worthy administrative penalties, the notion of consent being the lawfulness to rule all others and the Lord Lucan of rights, the right to forgotten.

Read Article

The 2018 Cyberthreat Landscape - Predictions & Trends

Posted: 20 December 2017

As in recent years, 2017 has been marked by an increasing number of cyberattacks, and indications point to another tumultuous year as we head into 2018. In this blog post, we hear from Lastline's co-founder and CTO Giovanni Vigna on what he predicts to be the cybertrends of next year:

Read Article

Cybercrime Laws: What Internet Fraud Victims Need to Know

Posted: 06 December 2017

As the Internet continues to be an important part of our lives, it also becomes a more dangerous avenue for cybercrime. The risk increases as the massive online community’s use of the Internet becomes more rampant. And despite the public being aware of cybersecurity issues, anonymous online criminals are able find more victims and creative ways to commit Internet fraud with the use of Internet services or software programs with web access.

Read Article

5 Ways the GDPR will Affect VAR Sales People

Posted: 22 November 2017

Much like the fable of the Emperor's New Clothes, there is much talk of the GDPR but little with any real substance. You have no doubt been told of the potential fines and heard of the right to be forgotten but how does the GDPR actually affect the IT security channel operationally? Rather than walking into 2018 wearing nothing, like the ill-fated Emperor in the tale. We interviewed Infinigate UK Sales Manager, Mike Tye, for his opinion on the operational challenges which he expects value-added resellers to witness as a result of the GDPR.

Read Article

Everything you need to know about DDoS attacks

Posted: 15 November 2017

Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and damaging cyber-attacks. Let’s examine how these attacks have evolved and how your company can mitigate them:

Read Article

Will purchasing contact data lists become illegal under GDPR?

Posted: 08 November 2017

In the pursuit of writing about the practical application of the GDPR (General Data Protection Regulation) rather than reciting the contents of the freely available regulation document, I am writing this blog to answer a commonly asked question regarding the purchasing of marketing contact lists post May 2018.

Read Article

How will GDPR affect how we use LinkedIn?

Posted: 01 November 2017

If you haven’t heard of the GDPR (General Data Protection Regulation), quite frankly I am in envy of you. Never has there been an IT security topic so heavily covered by those who wish to show they are literate and can re-write what they have read. Astronomical fines, forbidden non-consensual communication and mighty data subjects wielding new found rights have all been covered repeatedly and tirelessly.

Read Article

Wi-Fi Security not all its KRACK’d up to be…

Posted: 25 October 2017

Back in August 2001 a cryptanalysis of Wired Equivalent Privacy (WEP) was published which outlined a passive attack which could be used to recover the RC4 keys used to encrypt wireless traffic. Fast forward to October 2017 and its replacement WPA2 has had the same treatment in the form of the KRACK Attack.

Read Article

7 GDPR Opportunities for the IT Security Channel

Posted: 18 October 2017

As far as titles go, this one will likely prove divisive. On one hand, there are a plethora of IT security solution and service providers who are keen and hungry for the opportunity to work with customers on their preparations for the GDPR. On the other, doubt is sowed by those who question the ability of anyone who claims to know anything about the GDPR, simply because there is nobody with experience in application of a regulation which yet to come into force.

Read Article

5 Simple Tips for Online Security

Posted: 11 October 2017

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via social media channels, aligned to the weekly themes established by the Department of Homeland Security. The theme for week 1 of NCSAM is Simple Steps to Online Safety. Here are our daily doses of advice:

Read Article

3 Reasons why Biometrics are not Secure

Posted: 04 October 2017

Biometrics are definitely better than passwords when it comes to security, but they aren't fool-proof. Here are the three main reasons biometrics aren't secure.

Read Article

Anti-Spam & Phishing Checklist: 5 Techniques which all Mail Filters should have switched on

Posted: 27 September 2017

Email is unwaveringly consistent in upholding the theory of equal opposites. On one hand, it has enabled businesses to flourish in the electronic age with cheap and easy communication thus making it the default method of message exchange, however on the other, that direct-to-user route has meant that it remains the number one infection vector of choice for malware and phishing attacks since the 90's.

Read Article

5 Tips to Protect Critical Infrastructure in the Age of IoT

Posted: 20 September 2017

Keeping up with advances in technology is like being a hamster on a wheel: the race never ends. But that drive is ultimately what yields innovative advances in IT – for both hackers and cyber professionals alike.

Read Article


Share via:


Subscribe to VSEC Blog Updates

Popular Posts