<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

SMB's: Cybercrime's Number 1 Target

Posted: 27 February 2019

With all the headline breaches focusing on the more high profile victims of cyber breaches, you could be forgiven for thinking that the SMB sector is overlooked by hackers in favour of the big prize targets such as Ashley Madison, Three Mobile, FaceBook, Yahoo, LinkedIn and Target. That isn’t the case, SMB’s are in fact taking the brunt of cyber-attacks and in some cases providing a route into the bigger high profile targets…

Read Article

Everything the IT Security Channel Needs to Know About Machine Learning

Posted: 13 February 2019

What is it that you think of when reading or hearing the term "machine learning"? Chess playing robots? That gadget that cuts the grass of your lawn while you enjoy your new-found spare time? or the terminator relentless chasing Sarah Connor through a movie franchise and TV series?

Read Article

What is IoT and What Security Concerns Does it Bring to the Workplace?

Posted: 06 February 2019

From smart automated homes to WiFi enabled children's toys, this Christmas was a bounty for manufacturers of gadgets and gizmos offering internet connected functionality. Otherwise known as IoT or the Internet of Things.

But, what exactly is IoT and what concerns does it bring to companies and organisations who adopt such technology?

Read Article

3 Things you probably didn't know about Multi-Factor Authentication (MFA)

Posted: 23 January 2019

There is a very good chance that you have used multi-factor authentication (sometimes referred to as two-factor authentication) at some stage over the past few years, even if you are not familiar with the term.

Read Article

Women in IT: 7 ways to close the gender gap

Posted: 16 January 2019

It is widely recognised that there is still strong under-representation of women in IT. While this gender imbalance has improved over the years, there is still a long way to go. According to Women in Tech, only 1 in 6 tech specialists in the UK are women, only 1 in 10 are leaders and worse still, female representation in the tech sector has stagnated over the last 10 years.

Read Article

3 Worst Data Breaches From 2018 & How to Avoid Them

Posted: 09 January 2019

By now I am sure you have seen and read enough IT security "predictions" for 2019. As cynical as it may seem, I often chuckle at the alignment of an author's predictions and the solutions and services that they sell. Coincidence? Or good marketing?

Read Article

What is the difference between Artificial Intelligence, Machine Learning and Deep Learning?

Posted: 20 December 2018

AI, ML, DL... we live in an age of jargon which is sometimes hard to keep up with. You probably have a general awareness of what artificial intelligence (AI) is or you may even have worked with an IT solution which professes to use AI in some manner.

Read Article

Mighty Amazon Cut Down in Black Friday Data Breach

Posted: 28 November 2018

There are many myths surrounding the creation and naming of Black Friday, that yearly American imported shopping bonanza, which seemingly includes almost anything these days. Including, the dark web where it was reported that cyber criminal gangs were selling stolen credit card details at a limited discount.

Read Article

4 Reasons why the Future is Cloud

Posted: 07 November 2018

With the final months of 2018 in full swing, every vendor, marketing agency and outlet will be busy evaluating the events of the year; and looking into their crystal balls, in an attempt to predict the trends of 2019.

Read Article

The Truth About Cloud Hosted Services and the GDPR

Posted: 24 October 2018

Despite it being punished under the Data Protection Act 1998, the penalty handed out to Equifax recently in reaction to their catastrophic handling of a widely reported data breach in 2017, has pushed the issue of data protection and the GDPR right back under the spotlight.

Read Article

How to Choose the Right MSSP Provider (Top 5 Criteria)

Posted: 17 October 2018

If you have been following our blog for the past few weeks, you will know that we have been focusing on the well-known virtues of third-party managed IT security solutions, otherwise known as managed security services providers (MSSPs).

Read Article

4 Areas where the GDPR, NIS, Cyber Essentials & Minimum Cybersecurity Standard Overlap

Posted: 27 September 2018

For anyone who works in IT or compliance, you will be more than aware that the year 2018, has been seen more than its fair share of new regulations and updates to industry standards. This year alone we have seen the introduction or update of:

Read Article

5 Cloud Solutions That You Didn’t Know Existed

Posted: 19 September 2018

It seems that every IT-related conversation involves some element of cloud today. From cloud-hosted email, to cloud-hosted file storage and even cloud-based telephony through the use of centrally hosted VoIP services.

Read Article

Cloud Hosted Software is more secure than your Data Centre (4 Reasons Why)

Posted: 05 September 2018

I am sure that we can all agree that cloud hosted software or SaaS (Software as a Service) is generally more cost effective, more convenient and easier to maintain. But in the back of our minds, there is always a concern about security; and whether or not submitting to the cloud means losing control.

Read Article

Data Security Solutions for Small Businesses

Posted: 29 August 2018

Businesses that fail to take the steps necessary to protect their data, information and digital infrastructure are far more likely to suffer a data breach. A breach has the potential to do lasting harm and may even place the very survival of a business at risk. Organizations would do well to seek out any resources that may allow them to benefit from enhanced levels of security. A few tips are often all that may be required to ensure small businesses are able to take the appropriate precautions in order to better protect themselves and their data.

Read Article

Everything you need to know about the clash of the Cloud providers

Posted: 22 August 2018

Just a mere ten years ago, the job of an IT manager was to pack his or her server room with stacks of equipment, keep them blinking happily away and then build a huge wall of defences around it to keep the cyber riff-raff out. How simpler our lives seemed back then...

Read Article

Does GDPR Require Double Opt-in Consent?

Posted: 08 August 2018

It is both curious and comical to me how certain topics surrounding the GDPR (General Data Protection Regulation) seem to generate more buzz than others, whether they are correct or not. Such as the topic of consent being the only form of lawful processing, the overriding right to be forgotten in any circumstance and the belief that all forms of outbound marketing have been confined to history.

Read Article

Keeping the healthcare industry safe with the right IT software

Posted: 25 July 2018

The hospital and healthcare industry met quite a few challenges involving ransomware in the last year. Reports of malware infecting machines in medical facilities took over news channels. The reality even infiltrated popular culture when Grey’s Anatomy ran an episode where ransomware was an integral part of the storyline. We all laughed a little when the Chief of Surgery, Miranda Bailey, said she could afford 4,932 bitcoin without her knowing that the amount equated to $20 million. It became all too real for Grey-Sloan Memorial, and their example was a great depiction of what was really going on in the medical world.

Read Article

Finding Opportunities in the UK's New Minimum Cyber Security Standard

Posted: 18 July 2018

The last week of June saw the release of yet another cybersecurity compliance standard aimed the UK's public sector departments. Not content with the strain placed on departments across the country by the GDPR (General Data Protection Regulation), The NCSC (National Cyber Security Centre) has developed a five domain standard, which all government organisations should be meeting or ideally surpassing.

Read Article

How to Ensure Safety from Fraud Within your Business

Posted: 11 July 2018

Fraud is a major problem in modern-day businesses. It significantly hampers the progression of business and leads to loss of revenue. According to PriceWaterhouseCoopers’ evaluation reports, over half of all businesses today have in one way or another suffered fraud. In particular, 88 percent of companies within the United States have suffered fraud that led to subsequent declines in financial performance. This shows the detrimental effects of fraud.

Read Article

Everything you need to know about the NIS Directive

Posted: 04 July 2018

Hot on the heels of The GDPR (General Data Protection Regulation), yet enforced just fifteen days before, the directive on security of network and information systems (NIS) has been created to achieve a high, common level of network and information systems security across the European Union.

Read Article

The Facebook fiasco – Social media, privacy, and what it all means to business

Posted: 27 June 2018

Facebook has been in the news a lot lately, and the publicity hasn’t been the good kind. Reports that Cambridge Analytica – a British company that uses data mining and data analytics in providing consulting services to political campaigns – had accessed information about U.S. voters through their Facebook accounts created a firestorm. It also brought to the forefront the much broader issues of how all that “TMI” that we share on social media sites can end up in places and uses that we never intended or expected.

Read Article

5 Tips on How to Write a GDPR Ready Privacy Policy

Posted: 20 June 2018

In the scramble of the final days leading up to the 25th of May 2018, Google crawl bots would have noticed universal updates taking place across the internet. Privacy policies for an unquantifiable number of organisations and companies were being adapted to fit the GDPR.

Read Article

GDPR & Personal Data in the Public Domain

Posted: 30 May 2018

The 25th May 2018 has arrived and you as a data subject have been empowered with Europe's most ambitious and forward-thinking data protection regulation to date, the GDPR. As the ultimate steward of your personal data, you now have control over its use in most scenarios making data privacy a fundamental right. But what about instances where your personal data is available publicly? Is personal data fair game, once it is in the public domain?

Read Article

Preventing and recovering from a ransomware attack

Posted: 23 May 2018

It’s been almost a year since a zero-day ransomware attack called WannaCry infected hundreds of thousands of machines all over the world. Hackers encrypted files on infected computers and attempted to extort a ransom from their victims. Those infected with WannaCry were initially demanded to pay $300 in Bitcoin. Those affected were exploited by unpatched vulnerabilities in the Windows SMB service. Microsoft knew of the potential threat months before however, several businesses do not keep up on their patches which caused them to be an easy target for a WannaCry attack.

Read Article
Share via:
    

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts