<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Everything You Need to Know About CCTV and the GDPR

Posted: 08 January 2018

'The devil is in the detail' is a phrase which comes to mind when speaking about the GDPR (General Data Protection Regulation). The obvious topics surrounding the application of the regulation's articles have been extensively discussed, leaving behind those tricky and often overlooked details.

Read Article

Do you know what "The Right to Forget" in GDPR terms really means?

Posted: 03 January 2018

Wherever there exists a conversation about the GDPR (General Data Protection Regulation), you can guarantee a handful of infamous topics are covered. The scaremonger worthy administrative penalties, the notion of consent being the lawfulness to rule all others and the Lord Lucan of rights, the right to forgotten.

Read Article

The 2018 Cyberthreat Landscape - Predictions & Trends

Posted: 20 December 2017

As in recent years, 2017 has been marked by an increasing number of cyberattacks, and indications point to another tumultuous year as we head into 2018. In this blog post, we hear from Lastline's co-founder and CTO Giovanni Vigna on what he predicts to be the cybertrends of next year:

Read Article

Cybercrime Laws: What Internet Fraud Victims Need to Know

Posted: 06 December 2017

As the Internet continues to be an important part of our lives, it also becomes a more dangerous avenue for cybercrime. The risk increases as the massive online community’s use of the Internet becomes more rampant. And despite the public being aware of cybersecurity issues, anonymous online criminals are able find more victims and creative ways to commit Internet fraud with the use of Internet services or software programs with web access.

Read Article

5 Ways the GDPR will Affect VAR Sales People

Posted: 22 November 2017

Much like the fable of the Emperor's New Clothes, there is much talk of the GDPR but little with any real substance. You have no doubt been told of the potential fines and heard of the right to be forgotten but how does the GDPR actually affect the IT security channel operationally? Rather than walking into 2018 wearing nothing, like the ill-fated Emperor in the tale. We interviewed Infinigate UK Sales Manager, Mike Tye, for his opinion on the operational challenges which he expects value-added resellers to witness as a result of the GDPR.

Read Article

Everything you need to know about DDoS attacks

Posted: 15 November 2017

Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and damaging cyber-attacks. Let’s examine how these attacks have evolved and how your company can mitigate them:

Read Article

Will purchasing contact data lists become illegal under GDPR?

Posted: 08 November 2017

In the pursuit of writing about the practical application of the GDPR (General Data Protection Regulation) rather than reciting the contents of the freely available regulation document, I am writing this blog to answer a commonly asked question regarding the purchasing of marketing contact lists post May 2018.

Read Article

How will GDPR affect how we use LinkedIn?

Posted: 01 November 2017

If you haven’t heard of the GDPR (General Data Protection Regulation), quite frankly I am in envy of you. Never has there been an IT security topic so heavily covered by those who wish to show they are literate and can re-write what they have read. Astronomical fines, forbidden non-consensual communication and mighty data subjects wielding new found rights have all been covered repeatedly and tirelessly.

Read Article

Wi-Fi Security not all its KRACK’d up to be…

Posted: 25 October 2017

Back in August 2001 a cryptanalysis of Wired Equivalent Privacy (WEP) was published which outlined a passive attack which could be used to recover the RC4 keys used to encrypt wireless traffic. Fast forward to October 2017 and its replacement WPA2 has had the same treatment in the form of the KRACK Attack.

Read Article

7 GDPR Opportunities for the IT Security Channel

Posted: 18 October 2017

As far as titles go, this one will likely prove divisive. On one hand, there are a plethora of IT security solution and service providers who are keen and hungry for the opportunity to work with customers on their preparations for the GDPR. On the other, doubt is sowed by those who question the ability of anyone who claims to know anything about the GDPR, simply because there is nobody with experience in application of a regulation which yet to come into force.

Read Article

5 Simple Tips for Online Security

Posted: 11 October 2017

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via social media channels, aligned to the weekly themes established by the Department of Homeland Security. The theme for week 1 of NCSAM is Simple Steps to Online Safety. Here are our daily doses of advice:

Read Article

3 Reasons why Biometrics are not Secure

Posted: 04 October 2017

Biometrics are definitely better than passwords when it comes to security, but they aren't fool-proof. Here are the three main reasons biometrics aren't secure.

Read Article

Anti-Spam & Phishing Checklist: 5 Techniques which all Mail Filters should have switched on

Posted: 27 September 2017

Email is unwaveringly consistent in upholding the theory of equal opposites. On one hand, it has enabled businesses to flourish in the electronic age with cheap and easy communication thus making it the default method of message exchange, however on the other, that direct-to-user route has meant that it remains the number one infection vector of choice for malware and phishing attacks since the 90's.

Read Article

5 Tips to Protect Critical Infrastructure in the Age of IoT

Posted: 20 September 2017

Keeping up with advances in technology is like being a hamster on a wheel: the race never ends. But that drive is ultimately what yields innovative advances in IT – for both hackers and cyber professionals alike.

Read Article

Was your Email Address found in the World's Largest Spambot?

Posted: 13 September 2017

The average IT security administrator has much to be concerned about today; the threat of ransomware bringing their businesses to a halt, their readiness for the incoming GDPR (General Data Protection Regulation), trusted employees forever on the cusp of potential betrayal and now the return of the oldest foe of them all... spam.

Read Article

GDPR Challenge Number 1: Where to Begin?

Posted: 07 September 2017

Without much hesitation, I am certain that my experience of the past eighteen months has been similar to others. Attending and consuming countless GDPR focussed conferences, webinars, panel discussions, blog posts and webinars in an effort to strengthen my own grasp of the topic and to trade suggestions on real-life application with peers. There is much to gain from such occasions.

Read Article

The Six Commandments of the GDPR

Posted: 29 August 2017

Otherwise known as the measuring stick by which your some of your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed. Unquestionable and pure in nature, they are somewhat rarely acknowledged for one simple reason; five of the six have no real application in helping to peddling products and solutions.

Read Article

The UK Data Protection Bill 2017 vs. The GDPR

Posted: 17 August 2017

It's almost six months until the implementation date of the European GDPR (General Data Protection Regulation) and the UK begins its journey toward the club's exit door. The release of the DPB (Data Protection Bill 2017) has confirmed the UK's position on how it plans to remain tied, yet distinct from its European neighbours.

Read Article

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

Posted: 10 August 2017

The IT security industry, having grown each year since the dot-com bubble, is famously known as being a recession-proof investment. As more of our lives and our businesses grow to rely on the benefits of IT and the internet, so does the need to protect that reliance from any event which threatens it.

Read Article

What Happened to the World's Most Famous Bitcoin Wallets?

Posted: 26 July 2017

2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money.

Read Article

Navigating the GDPR Seas of Third-Party Processing

Posted: 06 July 2017

If the GDPR were a sea, it would be vast, confusing and in some places its shallow rocky geography would threaten metaphorical ships with disaster. Guidance for any would-be captain is plentiful; just searching for the term ‘GDPR’ in Google yields hundreds of thousands of results. From the basics of learning your portside and starboard to the more practical of how to protect your vessel from the supervisory authority’s arsenal, much is covered. That is with the exception of working with third-parties and most importantly, cross-border processing, something which is a normal aspect of business today, irrespective of size. This darker corner of the regulatory map is less often explored and must begin with identifying who is wearing the hat of the data controller and the data processor.

Read Article

To be or not to be? Using the Mask of Ransomware

Posted: 30 June 2017

Many businesses and organisations are still reeling from the outbreak of the WannaCry ransomware attack, only to be hit again by another cyber-breach nicknamed Petya (also known NotPetya or Nyetya), but not all is as it seems… It’s now clear that the malware used the EternalBlue exploit to spread, which was the same vulnerability used by WannaCry. This time however, security experts including Kaspersky Labs claim the aim of the attack was not for monetary gain but to cause damage and destruction.

Read Article

Passwords are not Dead but Complex Ones are

Posted: 21 June 2017

In a world of ever faster computing power, the thought that passwords should become simpler appears to be going against the grain. Yet, in May of 2017, the highly regarded American agency, NIST (National Institute of Standards and Technology), ended its consultative period for a new report into password guidelines. Contained within were some surprises about what we have come to believe about the security of complex passwords.

Read Article

Eight Steps to Prepare for a Summer of Ransomware

Posted: 14 June 2017

After the events of May 2017, cyber security teams may finally be able to eat from the adults table of respect at organisations worldwide. What had been predicted, yet often ignored for more than a decade, had materialised in the form of the WannaCry cyber attack; a service-extinction level event which rendered some of the world’s most famous brands and the UK's health service crippled and ultimately red-faced.

Read Article

WannaCry: The Worlds Cybercrime Wake-Up Call

Posted: 15 May 2017

If there was a person in the world who didn’t know what ransomware was, they probably do now. On Friday the 12th of May 2017, what was initially dismissed as an issue on NHS (National Health Service) England’s IT system quickly developed into a global incident involving computers, laptops and servers in 150 (and still counting) countries.

Read Article
Share via:
    

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts