<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Wi-Fi Security not all its KRACK’d up to be…

Posted: 25 October 2017

Back in August 2001 a cryptanalysis of Wired Equivalent Privacy (WEP) was published which outlined a passive attack which could be used to recover the RC4 keys used to encrypt wireless traffic. Fast forward to October 2017 and its replacement WPA2 has had the same treatment in the form of the KRACK Attack.

Read Article

7 GDPR Opportunities for the IT Security Channel

Posted: 18 October 2017

As far as titles go, this one will likely prove divisive. On one hand, there are a plethora of IT security solution and service providers who are keen and hungry for the opportunity to work with customers on their preparations for the GDPR. On the other, doubt is sowed by those who question the ability of anyone who claims to know anything about the GDPR, simply because there is nobody with experience in application of a regulation which yet to come into force.

Read Article

5 Simple Tips for Online Security

Posted: 11 October 2017

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via social media channels, aligned to the weekly themes established by the Department of Homeland Security. The theme for week 1 of NCSAM is Simple Steps to Online Safety. Here are our daily doses of advice:

Read Article

3 Reasons why Biometrics are not Secure

Posted: 04 October 2017

Biometrics are definitely better than passwords when it comes to security, but they aren't fool-proof. Here are the three main reasons biometrics aren't secure.

Read Article

Anti-Spam & Phishing Checklist: 5 Techniques which all Mail Filters should have switched on

Posted: 27 September 2017

Email is unwaveringly consistent in upholding the theory of equal opposites. On one hand, it has enabled businesses to flourish in the electronic age with cheap and easy communication thus making it the default method of message exchange, however on the other, that direct-to-user route has meant that it remains the number one infection vector of choice for malware and phishing attacks since the 90's.

Read Article

5 Tips to Protect Critical Infrastructure in the Age of IoT

Posted: 20 September 2017

Keeping up with advances in technology is like being a hamster on a wheel: the race never ends. But that drive is ultimately what yields innovative advances in IT – for both hackers and cyber professionals alike.

Read Article

Was your Email Address found in the World's Largest Spambot?

Posted: 13 September 2017

The average IT security administrator has much to be concerned about today; the threat of ransomware bringing their businesses to a halt, their readiness for the incoming GDPR (General Data Protection Regulation), trusted employees forever on the cusp of potential betrayal and now the return of the oldest foe of them all... spam.

Read Article

GDPR Challenge Number 1: Where to Begin?

Posted: 07 September 2017

Without much hesitation, I am certain that my experience of the past eighteen months has been similar to others. Attending and consuming countless GDPR focussed conferences, webinars, panel discussions, blog posts and webinars in an effort to strengthen my own grasp of the topic and to trade suggestions on real-life application with peers. There is much to gain from such occasions.

Read Article

The Six Commandments of the GDPR

Posted: 29 August 2017

Otherwise known as the measuring stick by which your some of your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed. Unquestionable and pure in nature, they are somewhat rarely acknowledged for one simple reason; five of the six have no real application in helping to peddling products and solutions.

Read Article

The UK Data Protection Bill 2017 vs. The GDPR

Posted: 17 August 2017

It's almost six months until the implementation date of the European GDPR (General Data Protection Regulation) and the UK begins its journey toward the club's exit door. The release of the DPB (Data Protection Bill 2017) has confirmed the UK's position on how it plans to remain tied, yet distinct from its European neighbours.

Read Article

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

Posted: 10 August 2017

The IT security industry, having grown each year since the dot-com bubble, is famously known as being a recession-proof investment. As more of our lives and our businesses grow to rely on the benefits of IT and the internet, so does the need to protect that reliance from any event which threatens it.

Read Article

What Happened to the World's Most Famous Bitcoin Wallets?

Posted: 26 July 2017

2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money.

Read Article

Navigating the GDPR Seas of Third-Party Processing

Posted: 06 July 2017

If the GDPR were a sea, it would be vast, confusing and in some places its shallow rocky geography would threaten metaphorical ships with disaster. Guidance for any would-be captain is plentiful; just searching for the term ‘GDPR’ in Google yields hundreds of thousands of results. From the basics of learning your portside and starboard to the more practical of how to protect your vessel from the supervisory authority’s arsenal, much is covered. That is with the exception of working with third-parties and most importantly, cross-border processing, something which is a normal aspect of business today, irrespective of size. This darker corner of the regulatory map is less often explored and must begin with identifying who is wearing the hat of the data controller and the data processor.

Read Article

To be or not to be? Using the Mask of Ransomware

Posted: 30 June 2017

Many businesses and organisations are still reeling from the outbreak of the WannaCry ransomware attack, only to be hit again by another cyber-breach nicknamed Petya (also known NotPetya or Nyetya), but not all is as it seems… It’s now clear that the malware used the EternalBlue exploit to spread, which was the same vulnerability used by WannaCry. This time however, security experts including Kaspersky Labs claim the aim of the attack was not for monetary gain but to cause damage and destruction.

Read Article

Passwords are not Dead but Complex Ones are

Posted: 21 June 2017

In a world of ever faster computing power, the thought that passwords should become simpler appears to be going against the grain. Yet, in May of 2017, the highly regarded American agency, NIST (National Institute of Standards and Technology), ended its consultative period for a new report into password guidelines. Contained within were some surprises about what we have come to believe about the security of complex passwords.

Read Article

Eight Steps to Prepare for a Summer of Ransomware

Posted: 14 June 2017

After the events of May 2017, cyber security teams may finally be able to eat from the adults table of respect at organisations worldwide. What had been predicted, yet often ignored for more than a decade, had materialised in the form of the WannaCry cyber attack; a service-extinction level event which rendered some of the world’s most famous brands and the UK's health service crippled and ultimately red-faced.

Read Article

WannaCry: The Worlds Cybercrime Wake-Up Call

Posted: 15 May 2017

If there was a person in the world who didn’t know what ransomware was, they probably do now. On Friday the 12th of May 2017, what was initially dismissed as an issue on NHS (National Health Service) England’s IT system quickly developed into a global incident involving computers, laptops and servers in 150 (and still counting) countries.

Read Article

According to the GDPR, it is In Force Already

Posted: 04 April 2017

We have all been conditioned to fear the arrival of May 2018. Hell-fire, brimstone and a newly powerful Information Commissioners Office (ICO) will rain administrative fines from the skies. Yet, for those who have summoned the ability to stay awake long enough to brave the final pages of the regulation, article 99 suggests its implementation date is less clear than originally thought.

Read Article

GDPR Myths and Monsters

Posted: 23 March 2017

Everybody has heard of fake news. Any politician worthy of their claim to modernity has dispensed the term as a battle cry against challenging forces. Bias, misunderstanding, spin, bending the truth are just some of the linguistic aliases which sit on a sliding scale of innocent mistake to concocted falseness.

Read Article

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

Posted: 24 February 2017

If the GDPR (General Data Protection Regulation), the EUs data protection harmonisation project, was to become a Hollywood movie, its genre would most likely be horror. Focus on the regulation over the past twelve months has been mostly aimed toward its penalties, with scare stories in no short supply.

Read Article

Could Cybercrime be the most Profitable Industry in the World?

Posted: 23 February 2017

2016 will be written in the history books as a turbulent twelve months. One which saw large fluctuations in currency values, a fall in the price of oil, the political fallout of Brexit, India’s savage attempt to reduce corrupt payments, the tussling of the election of the President of the United States, endless record busting data breaches and denial of service attacks affecting entire geographical regions.

Read Article

The Great GDPR Sale

Posted: 23 January 2017

If I had earned £1 for every time I was asked “which IT security solutions help with the incoming GDPR (General Data Protection Regulation)?” I would be able to purchase every possible solution myself. Only that would still fail to answer the question because it’s just not that simple. Nothing ever is.

Read Article

How Secure Is Google Drive?

Posted: 12 January 2017

Exfiltration is a decidedly unpleasant word, and it’s rarely connected with Google’s benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive?

Read Article

How To Secure Data In Motion

Posted: 13 December 2016

While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.

Read Article

When Keywords Become Buzzwords We All Lose Out

Posted: 08 December 2016

The pen is mightier than the sword is a phrase that can never be truer than in cyberspace, a place where words define your very ability to be noticed in a crowd.

Read Article

 

Share via:

    

Subscribe to VSEC Blog Updates

Popular Posts