Experts estimate that cybercrime might end up costing businesses a staggering $6 trillion by 2021. Organizations are focusing on how to strengthen cybersecurity in any sector, and the concern is understandable. After all, cyber attacks, including intellectual property, can dramatically affect efficiency, credibility, and company properties. A cybersecurity audit is a comprehensive review of your organization’s information systems to ensure they are operating smoothly and efficiently. It can also save your organization money. For example,…
Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or…
The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself. It is now an all too familiar scenario, yet another news story comes out regarding a high profile successful hack of a website, application or device. For old legacy software and devices it isn’t really surprising, but for anything created…
A recent article in the NY Times claims: The vast majority of targeted computer attacks now start with a malicious e-mail sent to a company employee.…
The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its suppliers need to have obtained a Cyber Essentials certificate before they are able to undertake certain contracts. This news has been coming for quite a while but judging by some reaction to this mandating of Cyber Essentials, it appears to have caught some by surprise. What exactly has been…
Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as…
It all started in the basement of the Computer Science department of University College London in about 1988. I was working alongside Paul Sharpe of then of GEC, who was working on user agents on the Thorn project. At the time I was implementing DISH – a directory user agent for the Quipu X.500 directory. Paul showed me how he had implemented a directory user agent for Thorn directly into the Unix Bourne shell, by using a background process, and communicating with shell…