Securing your cloud-first architecture using Stealthwatch Cloud and Cisco SecureX

In recent years, cloud computing has completely redesigned the way we live and work. Whilst businesses were once bound to on-premise infrastructures, the introduction of ‘the cloud’ has meant that firms can access corporate information using any device which is connected to the internet. Cloud architectures are understandably popular as they provide scalable services for a fraction of the price …

Email spoofing: Is it time to say no to email impersonation attacks?

Email spoofing is a malicious tactic used by cyber-criminals when conducting phishing attacks. It involves spoofing legitimate email addresses in order to pose as an individual or brand of trust. Cyber-criminals often masquerade as business owners, accounts departments or a person of authority within an organisation. The main aim of these malicious attacks is to coax the recipient into downloading …

The top 5 social engineering cyber-attack methods

Social engineering is the art of tricking employees into revealing sensitive corporate information. Hackers use psychological manipulation and well-researched ‘insider knowledge’ to dupe their victims. These tactics are commonly used to steal sensitive financial data, passwords to corporate accounts or access to devices in order to install malware or keyloggers. When a Cyber Criminal or ethical hacker conducts a social …

Engineering firm: Securing global workforce with AnyConnect VPN and Firepower 1140

In the wake of the Covid-19 crisis, businesses have been under huge pressure to quickly implement widespread remote working strategies. Against strict time constraints, IT teams have not only been responsible for keeping users connected, but also ensuring that their strategy complies with strict Cyber Security initiatives. Although many businesses are focused on maintaining productivity, it is important to carefully …

Covid-19: How to reduce the risk of the growing attack vector…

Due to the unprecedented impact of Covid-19, businesses have undergone a seismic change in recent weeks as millions are forced to work from home. This shift away from usual practices is a greatly anticipated change for many employees. However, as firms are under immense pressure to quickly implement a remote working strategy, the necessary security considerations are taking a back …

Could Covid-19 bring your business to a halt?

Ready or not, UK businesses are about to face a sudden remote-working test run. Since Covid-19 first took root in Wuhan China early this year, businesses across the globe have been forced to allow widespread remote working to minimise the risk of contagion. However, many IT teams and business owners are questioning whether their infrastructure has the capacity to support …

How to open the ‘window of visibility’ into your network

Every infrastructure has its weaknesses. However, if you are not able to identify these weak spots and their potential impact on your business, it is impossible to have a comprehensive view of the security and reliability of your network. ‘Network visibility’ is one of the most talked about concepts in the networking world right now. Unfortunately, without access to the …

Closing the ‘cyber-gap’ for SMB’s

Businesses around the globe are rapidly becoming more dependent upon digital technology. This is no longer used to simply function as a business, it also improves efficiency, connects departments and improves customer satisfaction. While this digital boom undoubtedly has its benefits, small businesses are faced with many challenges when it comes to securing their vital infrastructure. Surprisingly, now that there …