Cyber Security Archive
Cyber attacks are like earthquakes. There is the immediate shockwave when an incident occurs, as you hurry to identify the source of the breach, plug the vulnerability and fulfil your regulatory requirements. Then come the secondary waves that produce new …
DoS (denial-of-service) attacks play an unusual role in cyber crime. Unlike most forms of criminal hacking, they aren’t primarily designed to capture or sensitive information, which can be sold for profit. Instead, DoS attacks are intended to shut down or …
The cost of living crisis is affecting us all. Energy bills are soaring, petrol prices have reached record highs and, as the BBC reported this week, even the humble cheese sandwich has been struck by inflation. Despite these rising costs, …
Insider threats are one of the most difficult security challenges that organisations face. Staying safe isn’t simply about stopping criminal hackers from breaking into your systems, because the vulnerabilities already inside your organisation. A malicious threat can be an employee, …
Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage …
Malware is one of the most common cyber security threats that organisations and individuals face. Whenever someone talks about their computer being infected, encountering bots or even falling victim to a scam email, malware is normally involved. It’s why anti-malware …
It’s almost time to wrap up your prized possessions and put them in a safe place, because this Friday marks World Backup Day. The international event takes place on 31 March and aims to raise awareness of the importance of …
Organisations are always looking for ways to improve their security practices, and one of the most effective ways to achieve this is by providing employees with cyber security training. A Lucy Security study found that 96% of respondents agreed that a …
Confidentiality, integrity and availability. These are the three components of the CIA triad, an information security model designed to protect sensitive information from data breaches. The CIA triad is an important concept in the information security industry and is used …
Cyber incident investigation is one of the most crucial skills that an organisation can master. With countless information security threats looming over your business, you need to understand that data breaches are inevitable. When you come to this realisation, you …