One of our business core values is transparency.
Our teams expertise in cyber security and physical risk management, we believe, should be shared.
To remain true to this value, we will regularly publish white papers on various cyber security threats such as DDoS, Insider Threats, Ransomware and risk management papers also.
Cyber Security Series - Insider Threat
There are 2 types of potential Insider Threats: Malicious or Accidental. In the UK, the case involving Morissons Supermarket Chain that was established in 1899 is a clear example of how insider threat can affect a business of any size.
The case involves the theft and internet publication of over 100,000 employees pay data by a disgruntled employee in 2014. In a landmark case, over 5,518 of those former and current employees were successful in the first data leak class action in the UK. Those affected are now seeking compensation which is estimated into the millions. source
Our paper discusses how these events can occur within your business and provides recommendations to mitigate that risk.
Cyber Security Series - Ransomware
According to Europols EC3 - European Cybercrime Centre which annually publishes findings, trends and recommendations collaborating with all 28 members states and academia Ransomware attacks have eclipsed most other global cybercrime threats, with the first half of 2017 witnessing ransomware attacks on a scale previously unseen following the emergence of self-propagating ‘ransomworms’, as observed in the WannaCry and Petya/NotPetya cases. source
Our paper discusses prevention methods but also a realistic approach on the burning question of - should you pay the ransom?
Cyber Security Series - Security Mindset
Our personal and professional lives can intertwine at times.
While most business commuters understand the importance of keeping their personal belongings safe, is the company taking all the necessary measures to mitigate the risk to that employee by their own actions. An example of this is - do employees tag themselves on their own social media pages referencing the fact they are going on a work trip overseas or tag themselves at the hotel they are staying in? Sharing this information on a public forum can provide interested parties with the knowledge that you're probably travelling with work data that is valuable and immediately creates a risk for the safety or your employee and company data. Our paper addresses these often overlooked risks and recommends actions to engage, communicate and monitor yourteam'ss security mindset.
Cyber Security Series - DDoS
DDoS attacks remain a constant concern for European law enforcement. Following the success of the Mirai malware and its subsequent availability, EC3 (Europols European Cybercrime Centre) expects to see an increasing number of large-scale DDoS attacks originating from a variety of insecure Internet of Things (IoT) devices.
The most commonly reported (to law enforcement) attacks against critical infrastructures in the EU were DDoS attacks, with over 20% of countries reporting cases. source
Download our white paper to understand more about the risk of a DDoS attack to your business and important measures you can put in place to reduce your business risk.
Cyber Tips for Parents
This paper is aimed at parents and will offer some practical and digestible cyber security tips.
The digital era has nurtured innovation unlike anything we have experienced before but with that comes risk and vulnerabilities, not just for businesses, but for those at home too. A recent survey showed that the average age parents feel comfortable giving their child a phone is 13yrs old but at 13, most children won't know what to do should they be targeted by cybercrime.
Simple measures such as setting Parental Controls on each App and setting up your own account to review activity on their social platforms is a simple step in the right direction.
We have created a short animation to help you start that conversation and areas to focus on with your child.
The report includes useful links to how to set privacy on the most popular apps and we hope you find the paper useful, insightful and importantly that it starts a dialogue in your family about cyber safety.