Archives: Business Blog

What does a cyber security strategy look like?

One of the ways I keep up with what is new and current thinking in the cyber security world when I am on the road is by listening to the “Through the Security Rabbit Hole” podcast. As I was listening to one of the recent presentations, I was considering what a cyber security strategy should look like. […]

Finding information to help my business tackle cybercrime and its threat

The question asked by many a business is ‘Where do I find information about cybercrime and the threat it poses ?’ One good starting point is the CERT, the Government's Computer Emergency Response Team. In its own words it is described itself as: “Working with partners across industry, government and academia to enhance the UK’s cyber […]

TalkTalk saga: lessons and thoughts

Last weekend, the telecoms giant TalkTalk faced a huge crisis having been hacked by person or people unknown. News of the attack broke swiftly and was followed by a tsunami of interest and concern across social media. At the front of the messaging for the company was Baroness Dido Harding, who has since become a […]

Five notable examples of advanced persistent threat (APT) attacks

Advanced persistent threat attacks can be traced as far back at the 1980s, with notable examples including The Cuckoo’s Egg, which documents the discovery and hunt for a hacker who had broken into Lawrence Berkeley National Laboratory. In this early example the hacker, Markus Hess, had been engaged for several years in selling the results […]

City Police explain how to spot a bogus business masquerading as respectable

Trendy suits, smart offices and confidence  Every day of the week, educated professionals hand over huge sums of their hard earned cash to people they believe are highly respectable, only to discover at a later date the individual and their firm are far from legitimate, if they exist at all! Why are these ordinarily shrewd […]

How to improve your business data security

The Sony hack, the USIS leak, the JP Morgan credit card leaks, the iCloud celebrity photo hacks – these are just a few of the big profile hacks that took place in 2014. If the last year has taught us anything, it’s that businesses will be punished for their online safety shortcomings, no matter how […]

What is your business’s greatest cyber threat?

In the past year, cyberattacks have littered our new feeds, displaying the high cost of a corporate hack. To tackle this top-of-mind IT issue we’ve reproduced, with the kind permission of Modis, an infographic explaining your business’s greatest threat and easy tips to begin planning a remedy.  

Do organisations with poor data protection lack respect for their customers or employees?

Do organisations which enable their customer or employee data to be accessed by unauthorised parties disrespect their customers or employees? I would argue that they do, whether the cause is poor practice, lack of training, ineffective data (or online) security or they just don’t give a damn. Indeed, you could forgive the affected customers or […]

Protecting your company’s credit card information

With massive consumer and credit fraud making headlines across the pond, a recent report shows UK businesses aren’t immune to the same style of privacy breaches reported by US giants Home Depot, Target, and JP Morgan. Recent surveys are showing double digit increases in fraud and fraud losses over the last year. Fraud from remote […]

Cyber attack: how it put me out of business

Lee Moore is a businesswoman and writer who experienced a prolonged and traumatic cyber attack by a supplier between August 2013 and March 2014. It happened because she did not understand the cyber threats to her business nor have a cybersecurity plan in place.  I sowed the seeds of a 7 month, cyber-attack against me […]