Cyber security

Protecting your organisation from internal threats

Even advanced security systems are vulnerable to an insider – through malice or incompetence – opening the door or sharing information with outside actors. While many organisations’ IT departments focus their efforts primarily on hardening the organisation against external attacks, failing to understand “insider threats” can render these efforts meaningless.

Top five cyber security concerns: Are you protected?

Cyber risk must be articulated as a fundamental business risk and regularly reviewed at board level. Yet in many organisations cyber is still considered a risk the IT department will address, despite the existential threat for the entire business that a cyber-attack poses.

The Continued Rise of Ransomware: How to protect your business from an attack

Ransomware has dominated the cybersecurity news agenda in recent months, following a spate of high-profile attacks against critical infrastructure.

REvil retreat?

You may recall in June we speculated that ransomware would be on President Biden’s agenda when he met President Putin in Geneva. We suggested that ‘the Biden administration is likely to use the opportunity to put further pressure on the Russian government to assist in closing down the criminal networks benefitting from ransomware attacks’

The Cyber News Roundup
A look back at news, views and more over the past couple of weeks, taken from our last Cyber Security Insights newsletter and other sources. Catch up on the latest threats, research, advice and events – in fact, all things cyber - at your convenience. What's New? Casting the net wide REvil group targets over [...]
Cybercrime’s oldest profession

In the summer of 2015, a hacker group called Impact Team decided to take down Ashley Madison (owned at the time by Toronto based company, Avid Life Media) and expose their lax security. Ashley Madison’s high-profile CIO had been proclaiming that the site had amazing security because, as he put it, “It’s not lipstick on our collars anymore getting us caught, it’s digital lipstick; voicemails, text messages [etc.]”.

How is AI Changing the Cyber Security Game?

For decades we have used heuristic methods for analysing data, looking for pre-programed patterns through Boolean based logic: AND, OR and IF. This logic has been critical in automating simple and repetitive tasks usually prone to human error. However, this programmatic approach cannot meet the defence requirements for the current cyber threat.

The Cyber News Roundup
A look back at news, views and more over the past couple of weeks, taken from our last Cyber Security Insights newsletter and other sources. Catch up on the latest threats, research, advice and events – in fact, all things cyber - at your convenience. What's New? Sitting duck What's the low-hanging fruit for ransomware [...]
Lady working on computer in Cyber security setting
How safe are the organisations we entrust our card data too?

Being asked to email your card details to gain a refund is not a great process but is something I was asked to do recently.   Why not, you might ask? Shaun Wakefield explains.

Will Ransomware be on the agenda at the G7 Summit?

With days to go to the G7 Summit in Cornwall, the group of seven leading economies have some big issues on their agenda. The pandemic and climate change will no doubt dominate but what about cyber and the scourge of ransomware that is hitting so many organisations?

The Cyber News Roundup
A look back at news, views and more over the past couple of weeks, taken from our last Cyber Security Insights newsletter and other sources. Catch up on the latest threats, research, advice and events – in fact, all things cyber - at your convenience. What's New? One hit wonder One password allowed hackers to [...]
RUSI Webinar: Cyber, Technology and Geopolitics

Reliance acsn’s Vice-Chairman, Tarquin Folliss, asks Dr Buchanan if a large part of our vulnerability to the disruptive consequences of cyber-attacks is a consequence of our failure to protect adequately what is critical to us?