The Importance of Security Audits and Assessments

The cyber world is ripe with risk and threats and organizations go to great lengths, and cost, to prevent these threats from becoming an attack. To prevent cybercrime, it’s imperative to have an effective cyber security strategy in place. However, to determine the best plan for your organization you have to start from the beginning. What does this mean? Performing…

B0r0nt0K Ransomware Threatens Linux Servers – Users Beware

A new ransomware cryptovirus called "B0r0nt0K" has been putting Linux and possibly Windows Web servers at risk of encrypting all of the infected domain's files. The new ransomware threat and the ransom of 20 bitcoins (about US$75,000) first came to light last week, based on a post on Bleeping Computer's user forum. A client's website had all its files encrypted…

How IT Can Defend Against Ransomware

Paying your way out of a ransomware attack can be a viable option, but this route is not only expensive, it's dangerous. A better strategy is to build a successful defence and response plan. Here's how. We all know ransomware is one of the most destructive malware variants out there. You're talking about clicking on the wrong link and having…

How to integrate BYOD into a small business

BYOD offers substantial benefits, but also security worries The BYOD or Bring Your Own Device phenomenon has been gaining pace, especially after Apple’s iPad was released. As a small business owner BYOD can be something of a double-edged sword in that the benefits can be great, but security concerns can be worrying. According to Ovum, BYOD is being used by…

How to choose an encryption system for your business

Choosing and using an encryption system for your business’ data The information that your business collects about its customers and commercial partners can be its most precious assets. Add to this the data that your website handles on a daily basis, and it soon become clear that the protection of that information is critical to the success of your business.…

Best secure browsers 2017: 9 of the most private browsers UK

What does the idea of a secure browser mean? The world is now more complex than it was in 2010 when we last looked at the contenders. People are more oriented to mobile devices running under very different conditions while a range of security features such as URL filtering, download protection and do not track have transformed mainstream desktop browsers…

Making a voice-controlled robot is now as easy as Pi

Support for voice commands with the Raspberry Pi is here. The Windows 10 Creators Update brought forth an IoT Core with Cortana support to the Pi 3, and now the diminutive computer boards have been hooked up with Google Assistant. This is thanks to a partnership between Google and the makers of the Raspberry Pi, who put their heads together…

What is the internet of things?

Google searches have been filled with questions about the internet of things. What is it and why does it matter? Is it safe? Is it even real? Here are some answers A decade from now, everything could be connected to the internet of things. Photograph: Peter Menzel/The Human Face of Big Data Among its many other cultural and economic assets,…

Warning! when someone emails you a Google Doc link it could be malware!

A nasty piece of malware is going around that pretends to be a Google Doc link, maybe from someone you know. To protect yourself, don’t click on Google Doc links you weren’t expecting to receive. Often, these links are sent by people you know. Here’s an example I received this afternoon. Several of my colleagues have received identical emails. Apparently, if…

Cookies

What are cookies? Cookies are small pieces of data, stored in text files, that are stored on your computer or other device when websites are loaded in a browser. They are widely used to ‘remember’ you and your preferences, either for a single visit (through a ’session cookie’) or for multiple repeat visits (using a ‘persistent cookie’). They ensure a…