<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Was your Email Address found in the World's Largest Spambot?

Posted: 13 September 2017

The average IT security administrator has much to be concerned about today; the threat of ransomware bringing their businesses to a halt, their readiness for the incoming GDPR (General Data Protection Regulation), trusted employees forever on the cusp of potential betrayal and now the return of the oldest foe of them all... spam.

Read Article

GDPR Challenge Number 1: Where to Begin?

Posted: 07 September 2017

Without much hesitation, I am certain that my experience of the past eighteen months has been similar to others. Attending and consuming countless GDPR focussed conferences, webinars, panel discussions, blog posts and webinars in an effort to strengthen my own grasp of the topic and to trade suggestions on real-life application with peers. There is much to gain from such occasions.

Read Article

The Six Commandments of the GDPR

Posted: 29 August 2017

Otherwise known as the measuring stick by which your some of your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed. Unquestionable and pure in nature, they are somewhat rarely acknowledged for one simple reason; five of the six have no real application in helping to peddling products and solutions.

Read Article

The UK Data Protection Bill 2017 vs. The GDPR

Posted: 17 August 2017

It's almost six months until the implementation date of the European GDPR (General Data Protection Regulation) and the UK begins its journey toward the club's exit door. The release of the DPB (Data Protection Bill 2017) has confirmed the UK's position on how it plans to remain tied, yet distinct from its European neighbours.

Read Article

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

Posted: 10 August 2017

The IT security industry, having grown each year since the dot-com bubble, is famously known as being a recession-proof investment. As more of our lives and our businesses grow to rely on the benefits of IT and the internet, so does the need to protect that reliance from any event which threatens it.

Read Article

What Happened to the World's Most Famous Bitcoin Wallets?

Posted: 26 July 2017

2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money.

Read Article

Navigating the GDPR Seas of Third-Party Processing

Posted: 06 July 2017

If the GDPR were a sea, it would be vast, confusing and in some places its shallow rocky geography would threaten metaphorical ships with disaster. Guidance for any would-be captain is plentiful; just searching for the term ‘GDPR’ in Google yields hundreds of thousands of results. From the basics of learning your portside and starboard to the more practical of how to protect your vessel from the supervisory authority’s arsenal, much is covered. That is with the exception of working with third-parties and most importantly, cross-border processing, something which is a normal aspect of business today, irrespective of size. This darker corner of the regulatory map is less often explored and must begin with identifying who is wearing the hat of the data controller and the data processor.

Read Article

To be or not to be? Using the Mask of Ransomware

Posted: 30 June 2017

Many businesses and organisations are still reeling from the outbreak of the WannaCry ransomware attack, only to be hit again by another cyber-breach nicknamed Petya (also known NotPetya or Nyetya), but not all is as it seems… It’s now clear that the malware used the EternalBlue exploit to spread, which was the same vulnerability used by WannaCry. This time however, security experts including Kaspersky Labs claim the aim of the attack was not for monetary gain but to cause damage and destruction.

Read Article

Passwords are not Dead but Complex Ones are

Posted: 21 June 2017

In a world of ever faster computing power, the thought that passwords should become simpler appears to be going against the grain. Yet, in May of 2017, the highly regarded American agency, NIST (National Institute of Standards and Technology), ended its consultative period for a new report into password guidelines. Contained within were some surprises about what we have come to believe about the security of complex passwords.

Read Article

Eight Steps to Prepare for a Summer of Ransomware

Posted: 14 June 2017

After the events of May 2017, cyber security teams may finally be able to eat from the adults table of respect at organisations worldwide. What had been predicted, yet often ignored for more than a decade, had materialised in the form of the WannaCry cyber attack; a service-extinction level event which rendered some of the world’s most famous brands and the UK's health service crippled and ultimately red-faced.

Read Article

WannaCry: The Worlds Cybercrime Wake-Up Call

Posted: 15 May 2017

If there was a person in the world who didn’t know what ransomware was, they probably do now. On Friday the 12th of May 2017, what was initially dismissed as an issue on NHS (National Health Service) England’s IT system quickly developed into a global incident involving computers, laptops and servers in 150 (and still counting) countries.

Read Article

According to the GDPR, it is In Force Already

Posted: 04 April 2017

We have all been conditioned to fear the arrival of May 2018. Hell-fire, brimstone and a newly powerful Information Commissioners Office (ICO) will rain administrative fines from the skies. Yet, for those who have summoned the ability to stay awake long enough to brave the final pages of the regulation, article 99 suggests its implementation date is less clear than originally thought.

Read Article

GDPR Myths and Monsters

Posted: 23 March 2017

Everybody has heard of fake news. Any politician worthy of their claim to modernity has dispensed the term as a battle cry against challenging forces. Bias, misunderstanding, spin, bending the truth are just some of the linguistic aliases which sit on a sliding scale of innocent mistake to concocted falseness.

Read Article

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

Posted: 24 February 2017

If the GDPR (General Data Protection Regulation), the EUs data protection harmonisation project, was to become a Hollywood movie, its genre would most likely be horror. Focus on the regulation over the past twelve months has been mostly aimed toward its penalties, with scare stories in no short supply.

Read Article

Could Cybercrime be the most Profitable Industry in the World?

Posted: 23 February 2017

2016 will be written in the history books as a turbulent twelve months. One which saw large fluctuations in currency values, a fall in the price of oil, the political fallout of Brexit, India’s savage attempt to reduce corrupt payments, the tussling of the election of the President of the United States, endless record busting data breaches and denial of service attacks affecting entire geographical regions.

Read Article

The Great GDPR Sale

Posted: 23 January 2017

If I had earned £1 for every time I was asked “which IT security solutions help with the incoming GDPR (General Data Protection Regulation)?” I would be able to purchase every possible solution myself. Only that would still fail to answer the question because it’s just not that simple. Nothing ever is.

Read Article

How Secure Is Google Drive?

Posted: 12 January 2017

Exfiltration is a decidedly unpleasant word, and it’s rarely connected with Google’s benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive?

Read Article

How To Secure Data In Motion

Posted: 13 December 2016

While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.

Read Article

When Keywords Become Buzzwords We All Lose Out

Posted: 08 December 2016

The pen is mightier than the sword is a phrase that can never be truer than in cyberspace, a place where words define your very ability to be noticed in a crowd.

Read Article

The GDPR and it's Perpetual Time Stress Torture

Posted: 07 December 2016

Ever since the invention of the sundial, nothing has haunted humanity more than a lack of time. Mans curse to bear forever since is to periodically mutter the phrase "there's not enough hours in the day" in the hope the planet may spin a little slower and grant us our wish. It hasn't worked yet.

Read Article

Free Public Transport Fares, Courtesy of Ransomware

Posted: 05 December 2016

The IT security industry is a noisy one of late, with endless corporations being breached and new regulations promising to hit them on unhealed wounds as a response. It's easy to be distracted from some of the quieter risks often which can be found recharging at the benefit of lesser scrutiny.

Read Article

Low Risk, High Yield: Why Bank Heists Have Gone Cyber

Posted: 01 December 2016

Contrary to the teachings of The Italian Job movies, bank robberies were generally reserved for the more desperate of criminal-kind. Fraught with risk and danger, they weren't well known for having a positive outcome for the perpetrator.

Read Article

Could Technology Have Helped Prevent the Tesco Bank Breach?

Posted: 30 November 2016

Big network breaches are becoming the norm with little resistance seemingly being placed in the attackers path. Is this the world we must become accustomed to living in? or can technology be part of the solution rather than just the problem?

Read Article

Artificial Intelligence Will Save Encryption from Irrelevance

Posted: 25 November 2016

Some time ago I read an article which suggested that humankind was fast reaching "peak knowledge". It explained that the depth of discovered knowledge meant the time required to specialise in a field had exceeded the lifetime of a human itself.

Read Article

GDPR is Supposed to Make Business Easier... No Kidding

Posted: 10 November 2016

IT security loves fear, it's the very foundation upon which it is built. Much like the physical security world, without the fear of the possible, there would be no risk and no purpose to reduce it.

Read Article


Share via:


Subscribe to VSEC Blog Updates

Popular Posts