Email spoofing: Is it time to say no to email impersonation attacks?

Email spoofing is a malicious tactic used by cyber-criminals when conducting phishing attacks. It involves spoofing legitimate email addresses in order to pose as an individual or brand of trust. Cyber-criminals often masquerade as business owners, accounts departments or a person of authority within an organisation. The main aim of these malicious attacks is to … Read more

Cyber Security for the legal sector: Overcoming Cyber Security challenges during the Covid19 crisis and beyond

*This article is due to be published in the July edition of the Birmingham Law Society magazine. In recent years, there has been an increased demand for remote working in the legal industry. Although law firms are known for spending long hours in the office and the need for frequent face-to-face meetings, there has still … Read more

The top 5 social engineering cyber-attack methods

Social engineering is the art of tricking employees into revealing sensitive corporate information. Hackers use psychological manipulation and well-researched ‘insider knowledge’ to dupe their victims. These tactics are commonly used to steal sensitive financial data, passwords to corporate accounts or access to devices in order to install malware or keyloggers. When a Cyber Criminal or … Read more

Engineering firm: Securing global workforce with AnyConnect VPN and Firepower 1140

In the wake of the Covid-19 crisis, businesses have been under huge pressure to quickly implement widespread remote working strategies. Against strict time constraints, IT teams have not only been responsible for keeping users connected, but also ensuring that their strategy complies with strict Cyber Security initiatives. Although many businesses are focused on maintaining productivity, … Read more

Cyber Security spring clean: is it time for some digital dusting of your firewall rules?

We may all be housebound right now, but if you look out your window… Spring has sprung! The birds are chirping, the evenings are getting lighter and it’s the perfect time for some digital dusting. As Spring is a great time to start afresh, why not have a ‘spring clean’ of your firewall rules, to … Read more

Covid-19: How to reduce the risk of the growing attack vector…

Due to the unprecedented impact of Covid-19, businesses have undergone a seismic change in recent weeks as millions are forced to work from home. This shift away from usual practices is a greatly anticipated change for many employees. However, as firms are under immense pressure to quickly implement a remote working strategy, the necessary security … Read more

Could Covid-19 bring your business to a halt?

Ready or not, UK businesses are about to face a sudden remote-working test run. Since Covid-19 first took root in Wuhan China early this year, businesses across the globe have been forced to allow widespread remote working to minimise the risk of contagion. However, many IT teams and business owners are questioning whether their infrastructure … Read more

How to open the ‘window of visibility’ into your network

Every infrastructure has its weaknesses. However, if you are not able to identify these weak spots and their potential impact on your business, it is impossible to have a comprehensive view of the security and reliability of your network. ‘Network visibility’ is one of the most talked about concepts in the networking world right now. … Read more

Closing the ‘cyber-gap’ for SMB’s

Businesses around the globe are rapidly becoming more dependent upon digital technology. This is no longer used to simply function as a business, it also improves efficiency, connects departments and improves customer satisfaction. While this digital boom undoubtedly has its benefits, small businesses are faced with many challenges when it comes to securing their vital … Read more

How to stay safe from cloud security threats

So, what exactly is ‘the cloud’? Unsurprisingly, ‘the cloud’ has absolutely nothing to do with those white fluffy things in the sky. Essentially, the cloud is a way of storing and accessing data on a server separate to your corporate network. To enable the effective running of popular cloud applications like Dropbox, there are often … Read more