Dec 24, 2018 | Cloud Consultancy News
Christmas is just around the corner and so – unfortunately – is probably a nasty attack of phishing, which brings us to how to protect against phishing. Jan Oetjen takes us phishing, but with the odd interruption. With each UK citizen spending an average of £330...
Dec 21, 2018 | Cloud Consultancy News
A study conducted by Ponemon Institute found that 60 percent of organisations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and...
Dec 20, 2018 | Cloud Consultancy News
A phishing campaign has been discovered that pretends to be a non-delivery notification from Office 365 that leads you to a page attempting to steal your login credentails. This new campaign was discovered by ISC Handler Xavier Mertens and states that “Microsoft...
Dec 19, 2018 | Cloud Consultancy News
A recent phishing campaign targeting US government officials, activists and journalists is notable for using a technique that allowed the attackers to bypass two-factor authentication protections offered by services such as Gmail and Yahoo Mail, researchers said...
Dec 18, 2018 | Cloud Consultancy News
When you open a new tab in Chrome, there are several different ways you can configure what appears. You can have it show you frequently visited sites, news headlines, or maybe you prefer to keep things simple and leave it plain. But if you enjoy images, Chrome allows...
Dec 17, 2018 | Cloud Consultancy News
ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s PayPal address. The heist won’t go unnoticed by the victim if they are looking at the phone...
Dec 14, 2018 | Cloud Consultancy News
Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it spread through several campaigns, including a Thanksgiving-themed campaign. This...
Dec 13, 2018 | Cloud Consultancy News
Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet security report. The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by...
Dec 12, 2018 | Cloud Consultancy News
Dell Technologies will become a public company again December 28. The company said it received shareholder approval to buy back a tracking stock that’s linked to its stake in VMware. In a nutshell, Dell will close the deal December 28 and its C shares will trade...
Dec 11, 2018 | Cloud Consultancy News
Businesses in the UK think the government should be more focused on helping them deal with cybersecurity issues. This is according to a new report from RedSeal, which says a sensitive political and business environment this year has deflected attention away from...
Dec 10, 2018 | Cloud Consultancy News
Source: CSO from IDG Author: Roger A. Grimes I’ve written about what I consider the best current password advice for websites and services you need to keep secure. In a nutshell, here’s the advice again: – Use multi-factor authentication (MFA). – Where MFA...
Dec 7, 2018 | Cloud Consultancy News
N network Two or more computers linked in order to share resources. P patching – Applying updates to firmware or software to improve security and/or enhance functionality. pentest – Short for penetration test. An authorised test of a computer network or...
Dec 6, 2018 | Cloud Consultancy News
H hacker – In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks. honeypot (honeynet) – Decoy system or network to attract potential attackers that helps limit access to actual systems by...
Dec 5, 2018 | Cloud Consultancy News
D data at rest – Describes data in persistent storage such as hard disks, removable media or backups. dictionary attack – A type of brute force attack in which the attacker uses known dictionary words, phrases or common passwords as their guesses. digital...
Dec 4, 2018 | Cloud Consultancy News
A Antivirus – Software that is designed to detect, stop and remove viruses and other kinds of malicious software. App – Short for Application, typically refers to a software program for a smartphone or tablet. Attacker – Malicious actor who seeks to...
Dec 3, 2018 | Cloud Consultancy News
Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after the legislation was introduced. The findings come from a new survey by Thales eSecurity which polled 1000 combined UK and German...
Nov 30, 2018 | Cloud Consultancy News
In the turn of the century 18 years ago, people have embraced Web 2.0, a new dynamic web replacing the static HTML-only Web 1.0 fathered by Tim Berners Lee in the 1990’s. Web 2.0 as a successor hosted content that can never be imagined way back year 2000, streaming...
Nov 29, 2018 | Cloud Consultancy News
Amazon Web Services (AWS) has opened up its serverless language support, allowing “builders” to bring their own language to AWS Lambda. Making the announcement at AWS re:Invent on Wednesday, Amazon CTO Werner Vogels said the offering comes in response to...
Nov 28, 2018 | Cloud Consultancy News
Microsoft briefly took over Apple as the most valuable company in the United States. The company’s shares rose by 2.1% on Monday, with Apple’s shares falling by 0.7%. Apple, which was valued at $1 trillion just back in August, has faced a continued decline in its...
Nov 27, 2018 | Cloud Consultancy News
Phishing is fast becoming malware’s favourite vector, proving to be incredibly pervasive with 76 percent of businesses having reported to being a victim of a phishing attack in the last year. The scams are all-encompassing. Numerous instances, like the case of the...
Nov 26, 2018 | Cloud Consultancy News
How businesses are building firewalls is changing. We’re seeing a continued trend toward smaller firewall boundaries and micro-segmentation to support zero-trust strategies, although it can be very piecemeal. As businesses think less about centralized firewalls, and...
Nov 23, 2018 | Cloud Consultancy News
86 percent of IT and security decision makers across the globe believe their organisation needs to improve its awareness of IoT threats, according to Trend Micro. This significant lack of knowledge accompanies rising threat levels and security challenges related to...
Nov 22, 2018 | Cloud Consultancy News
Two months after Amazon announced that Skype video calling would become available on its Echo Show smart display, Microsoft has brought Skype calling—audio and video—to the Alexa platform. “Use Alexa to call friends and family on Skype or call mobiles and landlines in...
Nov 21, 2018 | Cloud Consultancy News
Two men who admitted their part in the October 2015 data breach of internet service provider (ISP) TalkTalk have been jailed. Matthew Hanley of Tamworth pleaded guilty to offences under the Computer Misuse Act 1990 in April 2017 for his role in the attack and received...
Nov 20, 2018 | Cloud Consultancy News
2018 has seen a major divergence in the operation of ransomware: targeted versus ransomware as a service (RaaS). Two particular malware families have dominated each branch: SamSam (targeted) and GandCrab (RaaS). Targeted seeks high ransoms from relatively few victims,...
Nov 19, 2018 | Cloud Consultancy News
Security researchers claim over 100,000 sites potentially affected, with the vulnerability available for attacks for weeks A privilege escalation flaw in a WordPress GDPR compliance plugin has exposed over 100,000 websites to attack. According to a post on security...
Nov 17, 2018 | Cloud Consultancy News
Japan’s new cyber-security minister has dumbfounded his country by saying he has never used a computer. Yoshitaka Sakurada made the admission to a committee of lawmakers. “Since I was 25 years old and independent I have instructed my staff and secretaries....
Nov 16, 2018 | Cloud Consultancy News
Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerised world of ours loves to suck data from everyone and everything. We are getting used to it,...
Nov 15, 2018 | Cloud Consultancy News
Almost as soon as email became widely used, crooks and scammers began using it as a means to defraud people. In today’s world, malicious fake emails continue to be a huge problem for individuals and businesses. Businesses make lucrative targets Losses due to Business...
Nov 14, 2018 | Cloud Consultancy News
On Monday Amazon launched the Alexa app for Windows 10 PCs via the Microsoft Store. The app allows you to use Alexa as you would on Echo devices like playing music or audiobooks, checking your calendar, creating reminders, controlling smart home devices…etc. It is...
Nov 13, 2018 | Cloud Consultancy News
Google has announced that, starting from Chrome 71, users will be explicitly warned when attempting to visit pages that try to trick them into signing up for mobile-based subscription services. The warning Pages that ask for users’ mobile phone details but show no...
Nov 12, 2018 | Cloud Consultancy News
DigiCert has executed a transfer of online trust, marked by the stable release of Chrome 70 that signals the end of Google’s Symantec root distrust plan. In the year since acquiring Symantec’s Website Security and PKI businesses, DigiCert has managed a certificate...
Nov 9, 2018 | Cloud Consultancy News
Myth 4: Security is an expense, not a revenue generator Organisations prioritise investment in services that generate revenue, especially when budgets are tight. This can leave cyber security, viewed as an expense, on the back burner, when it should be considered a...
Nov 8, 2018 | Cloud Consultancy News
Myth 3: Our organisation has not been breached before, so we’re still safe. Often, organisations incorrectly assume their security risks remain relatively static, when they don’t have a way to effectively evaluate those risks. Projecting future risks based on...
Nov 7, 2018 | Cloud Consultancy News
Myth 2: There’s no reason to invest in security when organisations with tight security controls still experience security breaches. Some organisations rationalise a small cyber security budget by arguing that investing in security is a losing game. They hear about...
Nov 6, 2018 | Cloud Consultancy News
Myth 1: Small organisations are low-value targets for hackers. Thinking you’re not a target is one of the biggest mistakes a company can make. According to data collected from more than 2,200 confirmed data breaches, 58 per cent of security event victims were small...
Nov 5, 2018 | Cloud Consultancy News
A vulnerability (CVE-2018-15454) affecting a slew Cisco security appliances, modules and firewalls is being exploited in the wild to crash and reload the devices, the company has warned on Thursday 1st November. About CVE-2018-15454 The vulnerability is in the Session...
Nov 2, 2018 | Cloud Consultancy News
At a high level, our goal in security is to manage, mitigate, and minimise risk. In an ideal world, we would enumerate the list of risks and threats we are concerned about and allocate the necessary resources to properly address them. Of course, we don’t live in an...
Nov 1, 2018 | Cloud Consultancy News
The office isn’t what it used to be. Where once workers would commute from their homes and make their way into a cubicle every day, the worker of today is just as likely to pull out a laptop and get their work done without even walking out their front door. The...
Oct 31, 2018 | Cloud Consultancy News
Cybercriminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue opportunities. In a joint report, IntSights scoured the Clear and Dark Web to assess retail data and...
Oct 30, 2018 | Cloud Consultancy News
Firewall automation projects are seemingly all the rage these days, with everyone looking to automate at least some portion of the process. Usually, the goal is to save time and money by automating firewall administration and policy management. However, these two...
Oct 29, 2018 | Cloud Consultancy News
With every new feature update for Windows 10, it comes packed with new features. One area of this update that has been improved is in security settings. First off, there is a name change. It is no longer called “Windows Defender Security Center”. Microsoft is renaming...
Oct 26, 2018 | Cloud Consultancy News
Apple and Samsung were fined Wednesday for software updates that Italy’s antitrust watchdog said slowed down users’ phones. The Italian Competition Authority, or AGCM, fined Apple and Samsung 5 million euros (about $5.7 million) each for releasing software...
Oct 25, 2018 | Cloud Consultancy News
As more and more organizations embrace the migration to the cloud, there are the inevitable questions that arise around its safety. Specifically, enterprises need to know that their data is going to be secure if they choose to embrace a cloud-based model, particularly...
Oct 24, 2018 | Cloud Consultancy News
Now that technology is the very lifeblood of any successful enterprise, getting the people that work for each organization to use their tech safely has become a priority. Technical and embedded process controls can take you so far, but every enterprise still needs...
Oct 23, 2018 | Cloud Consultancy News
In a new survey on cybersecurity culture, 90% of the nearly 5,000 technology professionals who participated identified a gap in their existing culture and the cybersecurity culture they would like to have, according to ISACA and CMMI Institute. The Cybersecurity...
Oct 22, 2018 | Cloud Consultancy News
As Halloween looms, it would certainly feel like the right time to think of our favourite horror stories. From an enterprise IT perspective, there are too many to keep up with these days. From the constant threat of cyber attacks from external hackers, to the rise of...
Oct 19, 2018 | Cloud Consultancy News
Apple will host another product announcement event on October 30 at 10am Eastern time, according to invitations that have gone out to members of the press and an update to Apple’s live events page. The invitation for the event carries the copy,...
Oct 18, 2018 | Cloud Consultancy News
There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organisations polled 660 IT and security professionals to get insight on the state of endpoint security risk, and have found...
Oct 17, 2018 | Cloud Consultancy News
Seventy-five percent of professionals pose a moderate or severe risk to the corporate data of the companies they work for. According to MediaPRO’s third-annual State of Privacy and Security Awareness Report, workers in the financial sector are more likely to be a risk...
Oct 16, 2018 | Cloud Consultancy News
Organisations across all industries are recognizing the value of automation, and the necessity of implementing it in their security infrastructure. However, beyond the simple promise of being able to act faster and save your employees’ time, the extent of automation’s...
Oct 15, 2018 | Cloud Consultancy News
Microsoft is planning a game streaming service, called Project xCloud, which it plans to trial in 2019. Microsoft revealed the plan just a week after Google unveiled Project Stream, its own PC gaming cloud service, which it it started trialing on Friday after many...
Oct 12, 2018 | Cloud Consultancy News
Microsoft has broken into the top five PC makers in the US for the first time. Market research firm Gartner revealed that Microsoft now holds 4.1 percent of the US PC market, edging out Acer for the fifth spot. It’s the first time Microsoft has entered the top five in...
Oct 11, 2018 | Cloud Consultancy News
Phishing is nearly as old as email, but it is still a major attack vector for cybercriminals. Some of the most prominent cyber incidents of the past few years are the result of phishing attempts. Despite the maturity of this problem, the solutions proposed by the...
Oct 10, 2018 | Cloud Consultancy News
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each new incident serves as a grim reminder to business leaders that hackers will not relent. Yet...
Oct 9, 2018 | Cloud Consultancy News
Software updates can seem like a chore, but they’re really an underrated perk of the gadget world. New hardware, like phones, cost money to upgrade. But new software is typically free, and ideally makes your device, or even just your web browser, better. Apple has...
Oct 8, 2018 | Cloud Consultancy News
Business Continuity and Disaster Recovery Last but certainly not least, a good cybersecurity plan focuses on more than prevention. It’s also concerned with mitigation. Should the worst happen and your business find itself under threat, how will you respond? How will...
Oct 5, 2018 | Cloud Consultancy News
A Focus On The Right Tools Armed with an understanding of your business’s unique threat profile and its employees distinctive needs, you can then reposition infrastructure and software planning as more of a collaborative process – not, in other words, the sole domain...
Oct 4, 2018 | Cloud Consultancy News
No matter your business’s size, you are a target for someone. Cybercriminals are now more numerous than ever, and they have a threat surface larger than any we’ve ever seen to exploit gleefully. And they aren’t the only risk to your organization’s assets, either –...
Oct 3, 2018 | Cloud Consultancy News
While open code repositories can increase efficiency in R&D, they also raise issues of security vulnerabilities. Today’s developers are under pressure to deliver new software at an increasingly rapid pace, leading to the more frequent use of open source code,...
Oct 2, 2018 | Cloud Consultancy News
When was the last time you thought about what permissions the apps on your phone have? Often, when downloading something new from the app store, many people somewhat blindly accept the various pop-ups that ask to allow the app access to their phone’s data; more...
Oct 1, 2018 | Cloud Consultancy News
Today, the SANS Institute Threat Hunting Survey report concludes that organisations are beginning to find cyber threats more effectively. However, whilst techniques, tools and the scope of threat hunting is expanding, the practice is still relatively poorly defined...
Sep 28, 2018 | Cloud Consultancy News
As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the...
Sep 27, 2018 | Cloud Consultancy News
Despite their training and best intentions, even the most security-minded employees behave in ways that put the enterprise at risk, according to The Security Culture Report 2018. The report, which covered eight industry sectors, surveyed more than 21,000 employees who...
Sep 26, 2018 | Cloud Consultancy News
Phishing emails are the most common way for criminals to distribute malicious software or obtain sensitive information. Is your business safe from these attacks? We have some tips that you can follow to make sure your business doesn’t become a victim! In a previous...
Sep 25, 2018 | Cloud Consultancy News
Google has quietly changed its policies so that logging into any Google service automatically logs the user into the Chrome web browser. This behaviour apparently began with Chrome 68. It was noticed by bloggers on Hacker News a couple of weeks ago and was recently...
Sep 24, 2018 | Cloud Consultancy News
It has only been a few days since last week’s Patch Tuesday which saw new security updates for all supported versions of Windows 10. And Microsoft is rolling out two new cumulative updates for the two most current versions of Windows 10 – Windows 10 April 2018 Update...
Sep 21, 2018 | Cloud Consultancy News
In surveying 500 small to medium-sized businesses (SMBs) across the US, Webroot discovered that many fail to recognize the many cybersecurity threats their businesses face, in large part because they lack in-house security expertise. According to The 2018 Webroot SMB...
Sep 20, 2018 | Cloud Consultancy News
If you’re one of the people who own a stylus or touchscreen-capable Windows PC, then there’s a high chance there’s a file on your computer that has slowly collected sensitive data for the past months or even years. This file is named WaitList.dat,...
Sep 19, 2018 | Cloud Consultancy News
The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities. Adding to the rapidly growing list of multi-functional malware, a particularly nasty – and unique — data-destroying malware tool has...
Sep 17, 2018 | Cloud Consultancy News
Enterprises are beyond the point of questioning the value of cloud computing to their businesses. However, that doesn’t mean that they can press ahead with their plans without considering how they will protect their apps and data in the cloud. Take Amazon Web...
Sep 14, 2018 | Cloud Consultancy News
Version 8 of Tor Browser, the multi-platform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest version The Tor Browser is based on a modified Mozilla Firefox ESR web browser and includes...
Sep 13, 2018 | Cloud Consultancy News
Passwords are beginning to feel like the zombie that just won’t die. Even after Bill Gates famously called for their demise in 2004, this antiquated form of user verification is still alive and kicking. Yet, many remain hopeful that passwords will slowly be phased out...
Sep 12, 2018 | Cloud Consultancy News
At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API) can serve as a gateway to the data...
Sep 11, 2018 | Cloud Consultancy News
Our digital selves, more and more, are becoming part of our full identity. The emails we send, the conversations we have over social media — both private and public — as well as photos we share, the videos we watch, and the websites we visit all contribute...
Sep 10, 2018 | Cloud Consultancy News
Microsoft seems to be toying with two different versions of the simplified ribbon. On the picture above, for example, Word Online has the more modern looking UI for the ribbon, while PowerPoint Online and Word Online below has a different, slightly modern ribbon UI....
Sep 8, 2018 | Cloud Consultancy News
While most tech companies that offer free email services are moving away from email scanning as a source of information for advertisers to target users more efficiently, Oath – the Verizon subsidiary that manages AOL and Yahoo and its webmail offerings – plans to...
Sep 7, 2018 | Cloud Consultancy News
Many British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them about their employers’ data storage practices, preparedness for GDPR, Cyber-Security...
Sep 6, 2018 | Cloud Consultancy News
Facebook-owned WhatsApp has recently announced that, starting on November 12, 2018, Android users will be able to store their WhatsApp backups on Google Drive without the backup being counted toward Google Drive’s storage quota. But, the company warns, those backups...
Sep 5, 2018 | Cloud Consultancy News
Networked printers increasingly are becoming targets of hackers as these devices often aren’t secured by enterprises. A new study cited by Booz Allen Hamilton found that of 61% of survey respondents who reported a data loss incident in 2016, at least 50% had at...
Sep 4, 2018 | Cloud Consultancy News
A recent survey of nearly 200 IT professionals about insider threats found that nearly half of the participants believed they could successfully attack their organisations from the inside. In a blog post earlier this week Imperva researchers reported on insider...
Sep 3, 2018 | Cloud Consultancy News
It has been clear for a while now that passwords no longer provide the user experience or security needed for consumers today. Take the fact that a few months ago, health and fitness app MyFitnessPal, was the latest brand to hit the headlines, as cyber thieves made...
Aug 31, 2018 | Cloud Consultancy News
The number of UK firms with cybersecurity insurance has risen in the past year — but less than half say their cyber insurance covers all risks. The second annual cybersecurity survey from research and consultancy firm Ovum, for Silicon Valley analytics firm FICO,...
Aug 30, 2018 | Cloud Consultancy News
Google appears to be working on dual-boot support for Chromebooks. XDA-Developers has discovered that Google has been working to support an “alt OS mode” for its Pixelbook laptop for months now. Dubbed “Campfire,” an obvious nod to Apple’s own Boot Camp feature,...
Aug 29, 2018 | Cloud Consultancy News
Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool takes advantage of facial recognition technology and searches for targets’ accounts on LinkedIn,...
Aug 28, 2018 | Cloud Consultancy News
The FBI is instructing users on how to recognize when their IoT devices have been compromised and advising them on how to keep them secure. “Compromised devices may be difficult to detect but some potential indicators include: a major spike in monthly Internet usage;...
Aug 27, 2018 | Cloud Consultancy News
Intel is planning to release its ninth-generation Core processors on 1 October, according to fresh reports. The range will include the Core i9-9900K, which will come with 16MB level one cache, eight cores and 16 threads running at a standard 3.6GHz, but capable of...
Aug 24, 2018 | Cloud Consultancy News
We are all too familiar with the game of leapfrog being played between cybersecurity personnel and hackers as stories of data theft, identity theft and malware are reported daily. Luckily, technology is often on our side. Machine learning can now watch for strange and...
Aug 23, 2018 | Cloud Consultancy News
We’ve already discussed some of the current malware threats looming large today. But there is a long, storied history of malware, dating back to infected floppy disks swapped by Apple II hobbyists in the 1980s and the Morris Worm spreading across Unix machines...
Aug 22, 2018 | Cloud Consultancy News
It’s fully possible—and perhaps even likely—that your system will be infected by malware at some point despite your best efforts. How can you tell for sure? When you get to the level of corporate IT, there are also more advanced visibility tools you can use to...
Aug 21, 2018 | Cloud Consultancy News
Antivirus software is the most widely known product in the category of malware protection products; despite “virus” being in the name, most offerings take on all forms of malware. While high-end security pros dismiss it as obsolete, it’s still the...
Aug 20, 2018 | Cloud Consultancy News
With spam and phishing email being the primary vector by which malware infects computers, the best way to prevent malware is make sure your email systems are locked down tight—and your users know how to spot danger. We recommend a combination of carefully checking...
Aug 17, 2018 | Cloud Consultancy News
This means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of malware is a virus). There are a number of different ways of categorizing...
Aug 16, 2018 | Cloud Consultancy News
Malware—a blanket term for viruses, worms, trojans, and other harmful computer programs—has been with us since the early days of computing. But malware is constantly evolving and hackers use it to wreak destruction and gain access to sensitive information; fighting...
Aug 15, 2018 | Cloud Consultancy News
Technology is evolving at such a rapid rate that the parameters of security practices are in constant flux too. Security measures that were thought to be sufficient in 2017 may already be outdated, and this rate of change is only set to further accelerate this year...
Aug 14, 2018 | Cloud Consultancy News
Underpinning both these challenges is the issue of finding the right expertise. And, as the threat environment evolves, this will become an even bigger problem for businesses. Of course, it’s not as simple as employing more staff – as well as headcount issues,...
Aug 13, 2018 | Cloud Consultancy News
Cyber-attacks are continuing to increase and evolve at an alarming rate. In just the last few weeks, we’ve seen the personal data stolen from accounts of 21 million Timehop users and 40,000 UK customers of Ticketmaster. Such breaches highlight how cyber threats have...
Aug 10, 2018 | Cloud Consultancy News
Tripwire released its State of Cyber Hygiene report, which examined how organisations are implementing security controls that the Center for Internet Security (CIS) refers to as cyber hygiene. The survey found that almost two-thirds of the organisations admit they do...
Aug 9, 2018 | Cloud Consultancy News
When Samsung unveiled its first-ever 1-terabit flash chip, it promised that massive SSD storage devices would soon follow. As promised, it’s now producing 4TB SSDs, and best of all, these drives are not for cloud companies or enterprises. “Samsung’s...
Aug 8, 2018 | Cloud Consultancy News
In the days leading up to May 25, email inboxes were filled with updated privacy notices and requests for marketing consent. Web browsers saw more banners about “cookies” than they had since broadband became ubiquitous, and businesses began to consider how they were...
Aug 6, 2018 | Cloud Consultancy News
Most companies believe they’ve experienced serious data breaches driven by email impersonation in the past 12 months – but are not doing nearly enough to prevent future impersonation attacks, according to a new study conducted by the Ponemon Institute. “With the...
Aug 3, 2018 | Cloud Consultancy News
Enterprise Mobility Management (EMM) is the process of leveraging people and technology to secure sensitive data present on employee devices. EMM automates security configurations on devices so they’re ready for corporate use. It also enables you to keep security...
Aug 2, 2018 | Cloud Consultancy News
Microsoft has launched the new dark mode for Outlook.com. The company teased the new dark experience for Outlook on the web earlier this month, and it’s now bringing the experience for everyone after multiple prototypes and iterations. Outlook.com’s new dark mode is...
Aug 1, 2018 | Cloud Consultancy News
The Kronos banking Trojan, the malware linked with security researcher Marcus Hutchins, has re-emerged following a re-tooling, and a re-branding as Osiris. It first made an appearance in 2014, used largely in malware campaigns in the UK and Japan before disappearing....
Jul 31, 2018 | Cloud Consultancy News
Microsoft has published details of the data Windows 10 exfiltrates from users as part of its General Data Protection Regulation (GDPR) compliance. The details provide insight into the various endpoints the operating system connects with, and forms part of a 438-page...
Jul 30, 2018 | Cloud Consultancy News
When Google boasted that none of its 85,000-plus employees had their accounts hacked since early 2017, it was all thanks to an early version of a security key the company was testing. And now the latest version of that security key will be available for the world to...
Jul 27, 2018 | Cloud Consultancy News
Google has been hit with a record-breaking €4.3 billion ($5 billion) fine by EU regulators for breaking antitrust laws. The European Commission says Google has abused its Android market dominance in three key areas. Google has been bundling its search engine and...
Jul 26, 2018 | Cloud Consultancy News
Anyone who has tried to hire an IT expert knows that the shortage of qualified people is real. We’re not just talking about IT security jobs, either. Almost every area of tech faces a skills shortage that threatens to sap productivity and presents challenges to IT...
Jul 25, 2018 | Cloud Consultancy News
Enterprise Password Managers Since secure passwords are practically impossible to remember, the use of a password manager such as Lastpass Enterprise or Roboform Enterprise can make secure passwords much easier for staff to handle. Essentially a password manager...
Jul 24, 2018 | Cloud Consultancy News
Cloud-Based Single Sign-On Tools One solution is to use a cloud-based single sign-on service. What services like OneLogin and Okta do is become the authentication provider for a cloud application like Salesforce.com. The cloud single sign-on service then links to...
Jul 23, 2018 | Cloud Consultancy News
Recent corporate security breaches have taught us something important: The average computer user is spectacularly bad at choosing good passwords. The most popular passwords turn out to be simple, easy-to-remember ones, like “password,”...
Jul 20, 2018 | Cloud Consultancy News
Making employee security training engaging If you want employee security awareness training to work, you need to learn how to engage your audience. Here’s how. Know your audience Messaging matters, and effective training programs tailor their content to their...
Jul 19, 2018 | Cloud Consultancy News
Employee security awareness tactics that work It may seem like an uphill battle, but there are ways businesses can arm their employees against these and other devious methods attackers use to scam businesses out of sensitive information or their cash. Here’s...
Jul 18, 2018 | Cloud Consultancy News
Phishing and ransomware top employee security concerns As a productivity tool, the email inbox has proven to be both a blessing and a curse. Among the types of attacks that workers often fall for, “phishing, spear-phishing and/or whaling” is number one,...
Jul 17, 2018 | Cloud Consultancy News
The maritime industry forms an integral part of our critical national infrastructure as our daily life depends on it to function properly. It is one of the core channels for global trade, with a staggering 80 per cent of goods by volume transported between countries...
Jul 16, 2018 | Cloud Consultancy News
Microsoft Teams can now compete directly with Slack with a free tier that startups not in Microsoft’s ecosystem can use for any user. This means you don’t need an Office 365 login to use Teams. With the free access tier, Microsoft Teams is now positioned...
Jul 13, 2018 | Cloud Consultancy News
Businesses are too busy fighting current cyber-threats to focus on what might be around the corner, new research has claimed. Findings from Accenture discovered that 51 per cent of businesses and their CSOs are under increasing pressure. Half of them are saying they...
Jul 12, 2018 | Cloud Consultancy News
Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching data that is no longer needed, and reducing the number of people who have access to it....
Jul 11, 2018 | Cloud Consultancy News
The UK government has published its first attempt at setting a minimum cyber security standard for public sector organisations: the inventively-named Minimum Cyber Security Standard (MCSS), which will be incorporated into the Government Functional Standard for...
Jul 10, 2018 | Cloud Consultancy News
The unified communications market is increasingly shrinking, as acquisitions hoover up companies large and small. The latest round has seen audio solutions provider Plantronics buy out UCC giant Polycom. Plantronics said that the acquisition would ‘accelerate’...
Jul 9, 2018 | Cloud Consultancy News
Google has posted a defense of Gmail’s privacy protections after a Wall Street Journal (WSJ) report found the service was allowing third-party companies to read personal emails. The WSJ reported that employees at firms offering personalised services, such as...
Jul 6, 2018 | Cloud Consultancy News
What makes it so easy to fall prey to phishing emails is that they look perfectly legitimate–official-looking emails from reputable companies getting in touch for seemingly reasonable purposes. It could be Apple, PayPal, or your bank. No matter how shrewd you are, it...
Jul 5, 2018 | Cloud Consultancy News
Aside from all previous articles in this series, there are many more online scams to look out for. Here are some of the most popular plays making the rounds right now. Fake antivirus software popup We mentioned popups in the tech support scam. A common one you might...
Jul 4, 2018 | Cloud Consultancy News
With bitcoin and other cryptocurrencies exploding in terms of popularity and market cap over the past few years, it’s no surprise that criminals want to get in on the action. Indeed, there are so many methods for scammers to choose from, and scams and hacks involving...
Jul 3, 2018 | Cloud Consultancy News
As if tax season isn’t already dreaded enough without scammers making life more difficult! Criminals look to exploit both taxpayers and the government using a range of tax-related scams. Fake audit In a fake audit scam, targets are contacted by someone claiming to be...
Jul 2, 2018 | Cloud Consultancy News
Many people purchase airline tickets, hotel rooms, and even entire vacation packages online these days. Scammers know this and there has been a rise in fraudulent travel sites selling fake tickets and non-existent vacations. Travel is usually a big-ticket item, which...
Jun 29, 2018 | Cloud Consultancy News
With the popularity of social media continuing to boom, it’s no surprise that it’s considered a ripe environment for scammers. While many of the other scams on this list could potentially be carried out through social media, a few very specific ones have popped up on...
Jun 28, 2018 | Cloud Consultancy News
Vishing Voice phishing (vishing) scams are not really online scams, but they are often linked and are becoming more sophisticated so are worth mentioning here. They use voice solicitation to get information or money from consumers or businesses. The scammer calls the...
Jun 27, 2018 | Cloud Consultancy News
We’ve touched on phishing in some of the other sections, but with this field comprising such a large portion of online scams, it’s good to know about the different types to look out for. In fact, the common element in almost all types of internet scams is the initial...
Jun 26, 2018 | Cloud Consultancy News
Extortion scams follow the basic premise that you need to hand over money urgently or face a predefined consequence, whether it be real or fabricated. Extortion schemes can be simple or extraordinarily complex, depending on the imagination of the perpetrator involved....
Jun 25, 2018 | Cloud Consultancy News
While most online scams can be targeted toward virtually anyone with access to a computer, many are crafted specifically with the elderly in mind. Seniors are often targeted for identity theft since they are perceived as being more susceptible to certain scams. Here...
Jun 22, 2018 | Cloud Consultancy News
Email scams are a type of fraud. While it’s true that a fraudulent offer can be contrived with almost any story, there are a few “tried and true” cons that seem to crop up repeatedly over time, such as advanced fee fraud, over payment fraud, and work from home scams,...
Jun 21, 2018 | Cloud Consultancy News
UK consumers are putting themselves at risk of attack by failing to update the security protection on home hardware such as routers. A study by Avast has found that many users rarely update their router’s firmware or change the factory settings login credentials,...
Jun 20, 2018 | Cloud Consultancy News
The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a smartphone. The discovery was made by Pen Test Partners researcher Andrew Tierney, who decided to probe the...
Jun 19, 2018 | Cloud Consultancy News
According to new rules recently published by Apple, iOS app developers must refrain from creating a database of the information gleaned from users’ Contacts and to sell it on. Wealth of private information The information contained in Contacts can be substantial....
Jun 18, 2018 | Cloud Consultancy News
US Cyber Command has been empowered to launch attacks against foreign countries. The more aggressive approach will be targeted at states that host or sponsor malicious hacking groups believed to be behind attacks on US companies and infrastructure. It represents a...
Jun 14, 2018 | Cloud Consultancy News
Email is still the number one threat factor among businesses, with four in five suffering an attack in the last year, according to new research. Barracuda polled 145 organisations across EMEA and concluded that 73 per cent felt the frequency of various email attacks...
Jun 13, 2018 | Cloud Consultancy News
Dixons Carphone, the retail chain responsible for the Dixons Travel, Currys, Carphone Warehouse and PC World shops, has admitted a security breach in which card details of up to 5.9 million people were spilled. In a separate security breach, 1.2 million general user...
Jun 12, 2018 | Cloud Consultancy News
Pen Test Partners’ Ken Munro and his colleagues – some of which are former ship crew members who really understand bridge and propulsion systems – have been probing the security of ships’ IT systems for a while now and the results are depressing: satcom terminals...
Jun 11, 2018 | Cloud Consultancy News
EE will switch on the UK’s first live 5G trial in October, allowing consumers and businesses to test out the next generation of mobile networks in London’s Tech City. A social media search for five SMBs and five residents to test the network using prototype devices...
Jun 8, 2018 | Cloud Consultancy News
95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, according to Apricorn. Does mobile working equal trouble? All surveyed IT decision makers...
Jun 7, 2018 | Cloud Consultancy News
Security is a constant topic of conversation in the tech world and Apple made sure to address it at the Worldwide Developer Conference (WWDC) 2018 Monday, where company leaders announced a bevy of new protections for the latest version of their macOS operating system,...
Jun 6, 2018 | Cloud Consultancy News
Apple have announced that Microsoft has agreed to offer Office 365 for download from the Mac App Store, which is being revamped for macOS Mojave. “We’ve talked to some developers [about the new Mac App Store] already, and they’re really excited to,” Apple’s Ann Thai...
Jun 5, 2018 | Cloud Consultancy News
With every day that goes by more IoT (Internet of Things) devices are becoming a part of our normal everyday life both at home and on the job. In recent years it has become evident that IoT devices pose a security risk for any network. While IoT manufacturers are...
Jun 4, 2018 | Cloud Consultancy News
As part of Microsoft’s commitment to making sure that products and services comply with General Data Protection Regulation (GDPR) they are implementing age requirements for minors to be able to download Office add-ins from the Store. This change is rolling out now for...
Jun 1, 2018 | Cloud Consultancy News
Knowing that many security systems scan links within emails to determine if they’re hacking, hackers often embed phishing links within clean attachments. As there is no malware in the attachment, the message won’t trigger ‘sandboxing’ technologies; and...
May 31, 2018 | Cloud Consultancy News
Homoglyph Attacks With homoglyph attacks, hackers leverage the similarities of character scripts to create and register phony domains to fool users and lure them into visiting fake sites. For example, they’ll often replace the Latin small letter “o” with...
May 30, 2018 | Cloud Consultancy News
Microsoft have rolled out cumulative update KB4103714 for Windows 10 1709 Fall Creators Update. Here’s a look at what to expect. If you held off on updating to Windows 10 1803, you should know that Microsoft have now released cumulative update KB4103714 for version...
May 29, 2018 | Cloud Consultancy News
Cousins domains can be created and used to spoof both the sender and the URL. With this technique hackers will remove letters or alternate the spellings to a registered domain name, so it looks deceptively similar to a target name. Here’s an example of a real address...
May 25, 2018 | Cloud Consultancy News
Apple once had grand aspirations to build its own electric self-driving car and lead the next generation of transportation. Over time, the tech giant’s ambitions ran into reality. So Apple curtailed its original vision, first by focusing on software for self-driving...
May 24, 2018 | Cloud Consultancy News
The reality of technology is often different than what is popularly portrayed: in the vast majority of cases, there are tangible advantages and disadvantages associated with any new innovation, and businesses are forced to make necessary compromises as a result. The...
May 23, 2018 | Cloud Consultancy News
While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security. Along with the clear benefits to be gained from upholding the standards enforced by GDPR,...
May 22, 2018 | Cloud Consultancy News
Microsoft is planning to release a line of lower-cost Surface tablets as soon as the second half of 2018, seeking a hit in a market for cheaper devices that Apple Inc. dominates with the iPad, according to people familiar with the matter. Microsoft has tried this...
May 21, 2018 | Cloud Consultancy News
Google has announced it is revamping its cloud storage and renaming Google Drive to Google One. In addition to a new name, there are new features and pricing plans. It will also add more versatility for those who opt for the basic free account with 15 GB of storage....
May 17, 2018 | Cloud Consultancy News
It’s almost 25th May, and if you’re like a lot of other companies around the world, you’re doing everything you can to get your GDPR (General Data Protection Regulation) ducks in a row. As a refresher, GDPR is the new privacy protection act taking effect in the EU...
May 15, 2018 | Cloud Consultancy News
A US police force has been hit by two data-shredding ransomware attacks within the space of just one month – with the FBI called in to investigate. The attacks on the network and servers of the police department in Riverside, Illinois took down months of police...
May 14, 2018 | Cloud Consultancy News
A year after the WannaCry ransomware attack impacted an estimated 200,000 victims and 200,000 computers, new research from Webroot has revealed that organisations across the UK are still struggling to deal with ransomware. Webroot surveyed over 400 IT decision makers...
May 11, 2018 | Cloud Consultancy News
When you hear the term cybersecurity, you would be forgiven if your mind wandered to an image of a Hollywood-style hacker, frantically typing away in front of multiple monitors, with lines of code pouring down the screens. This is the impression put upon us by shows...
May 10, 2018 | Cloud Consultancy News
IBM has banned its staff from using removable storage devices. An advisory to staff penned by IBM global chief Information security officer Shamla Naidoo said the company “is expanding the practise of prohibiting data transfer to all removable portable storage devices...
May 9, 2018 | Cloud Consultancy News
Security researchers are exploiting a new zero-day vulnerability in Office 365 that enables hackers to bypass security systems to send malicious emails. Dubbed BaseStriker by the researchers at security firm Avanan, the flaw affects the way that Office 365 servers...
May 8, 2018 | Cloud Consultancy News
A free 1-year trial of Microsoft Teams will soon be available for any user of Office 365 or Azure Active Directory (AAD), even if the user is not yet licensed for the service. Microsoft are rolling out this trial, beginning June 1. As customers have requested the...
May 4, 2018 | Cloud Consultancy News
Dashlane (the password manager company) examined password and account security on 55 of the world’s most popular travel-related sites, and found that 89% of sites leave their users’ accounts perilously exposed to hackers due to unsafe password practices. Researchers...
May 3, 2018 | Cloud Consultancy News
Undoubtedly, the biggest threat that businesses have to deal with today is cyber-attacks. From having files and systems locked by ransomware, through to denial-of-service attacks bringing down entire services, there’s never a long time between stories about yet...
May 2, 2018 | Cloud Consultancy News
New Ink features in Office 2016 for Windows. Office 365 and Microsoft 365 customers enrolled in the Office Insiders program will be able to access two new Ink-related features in the coming month: Ink analysis in PowerPoint 2016 and new Ink gestures in Word 2016. AI...
May 1, 2018 | Cloud Consultancy News
Surveying over 1,000 senior IT executives, from 18 countries, only 9% said they have made cyber-security a board-level priority. 60% of senior IT executives admit to more cyber threats in their organisation than they can control, survey reveals. A report by...
Apr 30, 2018 | Cloud Consultancy News
The delayed Windows 10 April Update will arrive today, 30th April. In a blog post on Friday, Microsoft finally confirmed that the newly-renamed Windows 10 April 2018 Update, which used to be known as the ‘Spring Update’, will be available as a free...
Apr 27, 2018 | Cloud Consultancy News
The most important thing to remember about the GDPR is that it’s not a one-off compliance effort like the rush to fix the Y2K Millennium Bug. On the contrary, it’s a continuous process that will need to be constantly evaluated and evolved over time. That’s good news...
Apr 26, 2018 | Cloud Consultancy News
Not Telling The Whole Truth Despite the threat of fines, reputational damage and major service interruptions, some companies may still be tempted to keep serious breaches of the regulation quiet. In fact, the role of the data protection officer (DPO) as an independent...
Apr 25, 2018 | Cloud Consultancy News
A Supplier Related Incident The GDPR will force a step-change in the way organisations manage their third-party suppliers and partners. In fact, under the new regulation, data processors such as cloud service providers are equally liable for breaches along with the...
Apr 24, 2018 | Cloud Consultancy News
Cybercriminals are nothing if not resourceful. We’ve seen extortion tactics become increasingly popular, most notably in the huge uptick in ransomware over the past few years — whereby the victim is forced to pay up or else lose access to their files forever. It’s...
Apr 23, 2018 | Cloud Consultancy News
No Big Fines…For Now The GDPR gives regulators the power to hit firms with a maximum fine of 4% of global annual turnover, or €20 million, whichever is higher. But contrary to many headline-grabbing predictions and FUD-led marketing, it’s unlikely that they will...
Apr 20, 2018 | Cloud Consultancy News
Hackers have been targeting shipping companies in a series of attacks over the past year, according to new research from Dell SecureWorks’ Counter Threat Unit, presented at the RSA Conference this week. Dell SecureWorks has dubbed the group Gold Galleon because...
Apr 19, 2018 | Cloud Consultancy News
An Android Trojan masquerading as popular mobile applications is propagating via smartphones roaming between Wi-Fi networks, Kaspersky Lab warns. Over the span of two months, the Moscow-based security firm observed the malware mainly targeting users in Asia. As part...
Apr 17, 2018 | Cloud Consultancy News
In just a few weeks on May 25, 2018, the deadline to be in compliance with GDPR will be here. For IT professionals who manage SaaS apps, GDPR compliance can be a little tricky. The sprawl of SaaS data can be hard to see and, in turn, protect. Here’s what you need to...
Apr 16, 2018 | Cloud Consultancy News
Microsoft is refreshing the design for its web-based account management dashboard. The company previously showed off variants of the redesigned Account dashboard in concepts before, but it is finally rolling out the new design to Microsoft Account users. The...
Apr 13, 2018 | Cloud Consultancy News
iboss has published the findings of its 2018 Enterprise Cloud Trends report. The survey of IT decision makers and office workers in U.S. enterprises found that 64% of IT decision makers believe the pace of software as a service (SaaS) application adoption is outpacing...
Apr 12, 2018 | Cloud Consultancy News
Verizon’s 2018 Data Breach Investigations Report (DBIR) is out, and companies of all sizes and industries need to take note of the results. In a summary of its findings, Verizon noted that 73 percent of the breaches were perpetrated by outsiders, 50 percent were...
Apr 11, 2018 | Cloud Consultancy News
Microsoft released new updates to its Office suite of apps on iOS earlier this week. Along with the usual improvements, the latest update for Word, PowerPoint, Excel and Outlook brings some new features. With the latest update, Microsoft is enabling support for iOS’...
Apr 10, 2018 | Cloud Consultancy News
The headlong rush to the cloud continues to accelerate, promising increased efficiency, flexibility and security, but CSOs are not off the hook when it comes to fortifying the privacy and security of their sensitive data. During the past five years, cloud and security...
Apr 9, 2018 | Cloud Consultancy News
Organisations are turning towards encryption to keep their data safe, new reports from Thales are saying. The critical information systems company issued its 2018 Global Encryption Trends Study, based on a poll of more than 5,000 people across multiple industry...
Apr 6, 2018 | Cloud Consultancy News
More than half (53 percent) of U.S. businesses that were infected with ransomware blamed legacy antivirus protection for failing to prevent the attack, according to SentinelOne. Nearly 7 out of 10 of these companies have replaced legacy AV with next-gen endpoint...
Apr 5, 2018 | Cloud Consultancy News
Over a quarter of businesses that have been hit by a Distributed Denial of Service (DDoS) attack don’t think they were the intended target, highlighting that businesses can’t afford to be complacent when it comes to today’s threat landscape. According to research from...
Apr 4, 2018 | Cloud Consultancy News
Small business as a target for cybercrime makes sense when you apply the human and financial resource components of doing business. Most small business do not have dedicated IT departments, they likely have not had the time or budget to train employees to be on the...
Apr 3, 2018 | Cloud Consultancy News
Despite being labelled ‘the most resolute’ country for dealing with the cyber attacks, ransomware is costing UK companies a whopping £346 million every year. In fact, more than 40 per cent of mid-large UK business suffered on average five ransomware attacks during the...
Mar 29, 2018 | Cloud Consultancy News
While most people know to run some type of cybersecurity protection on their computers, many ignore their mobile devices. To that point, a recent mobile threat research report reveals that every business has experienced at least one mobile cyberattack in the past...
Mar 28, 2018 | Cloud Consultancy News
If you haven’t done so already after seeing the title of this article, please stop reading immediately and enable two-factor authentication (2FA) on every system and service you use that allows it. The reality is that no matter how strong your password is – yes...
Mar 27, 2018 | Cloud Consultancy News
Please note this blog post does not constitute legal advice and is intended, and should be used, for general information purposes only. Controller — “the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines...
Mar 26, 2018 | Cloud Consultancy News
We’ve heard it time and time again: patches and updates are the key to mitigating vulnerabilities that lead to epic Equifax-sized breaches. The logic goes that security incidents can be avoided if you just update and patch your OS and applications as instructed. Is it...
Mar 23, 2018 | Cloud Consultancy News
Over the past few days, it’s likely that you’ve heard about Cambridge Analytica. The market research firm stands accused of developing an app to harvest the personal data of more than 50 million Facebook users. It then allegedly used this data to influence...
Mar 22, 2018 | Cloud Consultancy News
February was a tough month for the Colorado Department of Transportation, which suffered two back-to-back ransomware infections. After security measures to protect against the first ransomware infection were put in place and recovery was underway, a new ransomware...
Mar 21, 2018 | Cloud Consultancy News
Apple reportedly has a two-year lead over most Android manufacturers with its 3D sensing tech on the iPhone X. The new 3D sensing tech on Cupertino’s flagship iPhone powers the new Face ID feature, which allows for seamless authentication for payments, and improved AR...
Mar 20, 2018 | Cloud Consultancy News
Apple’s laptops, smartphones, tablets and watches rely on hundreds of parts, most of which Apple sources from other companies around the world. But the more of those parts Apple can make itself, the more profit it can generate as well as making its supply chain...
Mar 19, 2018 | Cloud Consultancy News
The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The GDPR applies to all 28 European Union (EU) member nations as well as Iceland, Norway, and Liechtenstein, non-EU nations that are part of the European Economic Area (EEA). For now, the...
Mar 16, 2018 | Cloud Consultancy News
Cybersecurity is one of the leading boardroom issues. If data is corrupted, deleted, or encrypted with ransomware by hackers who demand a fee to provide the unlock code, a targeted cyber-attack can cause chaos for a business, from both a financial and reputation...
Mar 15, 2018 | Cloud Consultancy News
Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance. According to the research, the uncovered flaws could allow attackers...
Mar 14, 2018 | Cloud Consultancy News
Last weeks update from Microsoft debuts a new feature for its intelligent camera app, Microsoft Pix, that works with LinkedIn, showcasing the productivity capabilities of the AI-powered camera. The new Business Card feature for iPhones makes it quick and easy for you...
Mar 13, 2018 | Cloud Consultancy News
Microsoft’s Teams platform is turning one this week and with more than 200,000 businesses using the software, it’s fair to say that it has been a successful first year for the product. But, more importantly for those that are using the software, the company is sharing...
Mar 12, 2018 | Cloud Consultancy News
How soon will we see our home, office or industrial robots being hijacked and held ransom by attackers? If they dedicate their efforts to research, that day may come sooner rather than later. IOActive researchers Lucas Apa and Cesar Cerrudo say that the attackers are...
Mar 9, 2018 | Cloud Consultancy News
Half of organisations that cough up after being subject to ransonware attacks never get their data back, according to a new report. Published in the latest cyber threat report by research firm Cyber Edge Group, the findings suggest that while half never see their data...
Mar 8, 2018 | Cloud Consultancy News
Botnets act as a force multiplier for individual attackers, cyber-criminal groups and nation-states looking to disrupt or break into their targets’ systems. By definition, they are a collection of any type of internet-connected device that an attacker has compromised....
Mar 7, 2018 | Cloud Consultancy News
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. The single most common source of breaches analysed in the report was attackers exploiting vulnerabilities in an businesses...
Mar 6, 2018 | Cloud Consultancy News
The cost of the data breach at credit-reference agency Equifax has now reached at least $439 million, according to recent tax filings. They come as the company admits to finding that a further 2.4 million accounts were breached. And according to Reuters, the...
Mar 5, 2018 | Cloud Consultancy News
The ultra-thin, ultra-light MacBook Air has been one of Apple’s most ignored products over the last several years, with the company instead focusing on MacBook Pro updates and the newer 12-inch MacBook. The MacBook Air is available and sells reasonably well but not...
Mar 2, 2018 | Cloud Consultancy News
Microsoft are rolling out the ability to add anyone as a guest in Microsoft Teams. Previously, only those with an Azure Active Directory (Azure AD) account could be added as a guest. Starting next week, anyone with a business or consumer email address (including...
Mar 1, 2018 | Cloud Consultancy News
Last November, Microsoft announced Resume Assistant, a new AI feature in Microsoft Word to help you craft a compelling CV with personalised insights powered by LinkedIn. This month, Resume Assistant began rolling out to Office 365 consumer and commercial subscribers...
Feb 28, 2018 | Cloud Consultancy News
With the GDPR deadline passing the 100 day mark recently, the May 25th deadline looms closer. Many businesses have begun preparing for the new legislation, but its full implementation is likely to reveal some unforeseen challenges and it is anticipated that large fine...
Feb 27, 2018 | Cloud Consultancy News
The General Data Protection Regulation (GDPR), which began as a regulatory requirement, is increasingly seen as a long-term opportunity to establish greater trust with customers and further unlock employee collaboration and productivity in many businesses. The...
Feb 26, 2018 | Cloud Consultancy News
Last but not least, make sure that you are communicating with business leaders and end users about any changes to your firewall rules. Getting input from the business can help make sure that your firewall configuration is meeting end users’ needs. Having open...
Feb 25, 2018 | Cloud Consultancy News
It goes without saying, but as you update your firewall rules, it’s also a good time to make sure that you have installed all the latest patches to your firewall. The greatest list of firewall rules in the world won’t stop an attack if your firewall has a...
Feb 24, 2018 | Cloud Consultancy News
Another way to improve the performance of your firewall is to use your routers to handle some of the traffic-blocking activities. By offloading some work from your firewall, you may be able to eliminate some firewall rules and improve throughput for your network. As...
Feb 23, 2018 | Cloud Consultancy News
It isn’t true of every firewall, but most apply rules in the order that they are listed in your firewall configuration software or rule base. In other words, the firewall will start at the top of the list and keep going down until it reaches rule that would...
Feb 22, 2018 | Cloud Consultancy News
Mobile phone operator Vodafone has commenced trials of what it claims is the world’s first drone tracking and safety system. The technology, which it describes as an air traffic control system for drones, is aimed at monitoring unmanned aerial vehicles (UAVs)...
Feb 21, 2018 | Cloud Consultancy News
Local authorities across the UK have been exposed to more than 98 million cyber attacks in the past five years, according to a new study. After conducting freedom of investigation requests on councils around the country, privacy campaign group Big Brother Watch found...
Feb 20, 2018 | Cloud Consultancy News
Apple’s iOS 12, the next iteration of the company’s mobile operating system, will offer developers the opportunity to create iPhone apps that will also run on Apple’s desktop operating system. That’s according to Bloomberg’s Mark Guttman,...
Feb 19, 2018 | Cloud Consultancy News
Apple’s APFS proprietary file system is suffering from a disk image vulnerability that could lead to data loss, according to an Apple software developer. APFS, which simply stands for Apple File System, aims to fix core problems on MacOS, iOS, tvOS and WatchOS....
Feb 18, 2018 | Cloud Consultancy News
Every firewall comes with built-in reporting tools that provide details about your traffic. Another firewall rules best practice is to audit those logs regularly to look for changes or anomalies that might suggest modifications to your firewall settings. This log data...
Feb 17, 2018 | Cloud Consultancy News
As you go through your list of firewall rules and update your documentation, you may find that you have more than one rule serving the same purpose. If you can eliminate one of those rules or combine some rules to be more effective, that can speed up your network....
Feb 16, 2018 | Cloud Consultancy News
Your network is always changing. You are gaining new users and new devices. Those users and devices are accessing new applications and new services. And applications and devices that once accounted for a high percentage of network traffic may become far less popular...
Feb 15, 2018 | Cloud Consultancy News
The next major upgrade to its Office productivity suite, Office 2019, will be available to Windows 10 users only – leaving Mac users and users of Windows 7 out in the cold, or forcing users to upgrade to the cloud-based version, Office 365. The vast majority of...
Feb 14, 2018 | Cloud Consultancy News
Starting 6th February, Microsoft is offering OneDrive for Business for free for the remaining term of an existing contact for those companies using a competitors product. But, and there is a larger qualifier for the offer, you must have at least a 500 user commitment....
Feb 13, 2018 | Cloud Consultancy News
Microsoft is already planning to dump Windows 10 S, its stripped-down operating system intended to take on Chrome at the low-end. Instead, the software giant will install an “S Mode” on standard versions of Windows 10, locking them down to a...
Feb 12, 2018 | Cloud Consultancy News
Law enforcement agencies around the world have shut down what they claim was one of the world’s biggest cyber crime rings, behind as much as $530 million in consumer losses across the world. Thirty-six people have been arrested by authorities in Australia,...
Feb 12, 2018 | Cloud Consultancy News
Teams and individuals depend on Microsoft Planner to get organized quickly, work together effortlessly, and stay on the same page—no matter how large or small the project. Four new features for Planner will give you greater visibility into project schedules, let you...
Feb 11, 2018 | Cloud Consultancy News
One way to make sure that you are following your change procedures is to use an automation solution for any firewall configuration updates. Automation can also help prevent mistakes in the firewall setup process. As 99 percent of firewall breaches are caused by errors...
Feb 10, 2018 | Cloud Consultancy News
Before you begin changing any of your existing firewall rules, you should establish a formal process that you will use for any modifications, if you don’t already have such a process. A typical change procedure might involve the following steps: A change request...
Feb 9, 2018 | Cloud Consultancy News
Document your firewall rules Anyone who works on your IT security team should be able to tell very quickly what each of your firewall rules was intended to do by looking at your documentation. At a minimum, you need to keep track of the following data: – The...
Feb 8, 2018 | Cloud Consultancy News
Cloud risks have filled the news cycle of late, but the real cloud security landscape is nothing like the headlines would have you believe. For example, serverside ransomware attacks, despite their high public profile, account for only about 2 percent of recorded...
Feb 7, 2018 | Cloud Consultancy News
Security researchers have discovered a new variant of the Scarab ransomware, which threatens to delete 24 documents every 24 hours from victims’ PCs unless – or until – they pay the ransom. In June 2017, security researchers identified the...
Feb 6, 2018 | Cloud Consultancy News
WhatsApp has now released its desktop app on the Microsoft Store for Windows 10 PCs. Nearly 9 months ago, a mysterious listing of the WhatsApp desktop app showed up on the Windows Store. The listing was updated a couple of times over the last few months, but it was...
Feb 5, 2018 | Cloud Consultancy News
To create a filter that blocks a sender from your Gmail inbox and sends a reply to the (blocked) sender letting them know their message was automatically removed: 1 – Make sure the CANNED RESPONSES lab is enabled. (See note at the end of this blog) 2 –...
Feb 3, 2018 | Cloud Consultancy News
Windows 10 installations have finally overtaken Windows 7 installations – two-and-a-half years after it was released. That’s according to StatCounter, which regularly provides figures and research covering the desktop operating system sector. Its latest...
Feb 2, 2018 | Cloud Consultancy News
Almost all organisations are being peppered with phishing emails – also known as business email compromise (BEC) scams – intended to hook unwary executives. That’s according to a survey by security firm Agari, which claims that the losses in the US...
Feb 1, 2018 | Cloud Consultancy News
A new Imperva survey showed a heightened concern for CyberSecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks and authentication enforcement for APIs. APIs power the interactive digital experiences...
Jan 31, 2018 | Cloud Consultancy News
When faced with an external attack or data breach, a business is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimise the damage of an attack, meaning that the recovery effort should take as little time as possible...
Jan 30, 2018 | Cloud Consultancy News
Hover Card is a new OneDrive for Business File Office 365 feature. Basically now as soon as you hover your mouse over a file you will be able to see file details including access stats (number of views, who viewed and who modified). In SharePoint Online document and...
Jan 29, 2018 | Cloud Consultancy News
2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these attacks are...
Jan 26, 2018 | Cloud Consultancy News
Apple’s HomePod will be released on February 9, around two months after it was first due to go on sale. The Siri-powered smart speaker, a competitor to Amazon’s Echo range and the Google Home speaker, was announced in June last year and was originally due...
Jan 25, 2018 | Cloud Consultancy News
An investigation by the Electronic Frontier Foundation (EFF) and security biz Lookout has uncovered Dark Caracal, a surveillance-toolkit-for-hire that has been used to suck huge amounts of data from Android mobiles and Windows desktop PCs around the world. Dark...
Jan 24, 2018 | Cloud Consultancy News
One of Gmail’s most effective security features is hardly used by anyone, Google has revealed. Two-factor authentication (2FA) has been enabled on less than 10 per cent of active Google accounts, the company says. The feature is designed to make it much harder for...
Jan 23, 2018 | Cloud Consultancy News
In excess of a million email addresses and hacked credentials taken from some of the UK’s foremost legal firms are floating around on the dark web, according to a new report. To be precise, security outfit RepKnight reckons that it found almost 1,160,000 email...
Jan 22, 2018 | Cloud Consultancy News
London — Apple today announced 70 colleges and universities in Europe have adopted Everyone Can Code, a comprehensive program designed by Apple to help everyone learn to build mobile apps. These colleges and universities are adopting Apple’s App Development with Swift...
Jan 22, 2018 | Cloud Consultancy News
Electric cars may be growing in popularity, but cyber security giant Kaspersky has warned drivers to be wary of chargers. According to Kaspersky, car manufacturers may be investing heavily into electric vehicles, expecting a market shift from petrol and diesel any...
Jan 20, 2018 | Cloud Consultancy News
If your a Small Business owner your most have experienced a problem with what should be simple Excel formulas and struggled for ages trying to get them correct. PC World have put together a great article that can help you. Click here to view the article.
Jan 19, 2018 | Cloud Consultancy News
Four of Google Chrome’s most popular extensions, which have amassed more than 500,000 downloads in total, are thought to be malicious. According to ArsTechnica, Google has since banned the extensions from the Chrome Web Store, but they reveal weaknesses in what...
Jan 18, 2018 | Cloud Consultancy News
Apple’s macOS is reportedly the target of a new DNS hijacking exploit. The malware is being likened to the DNSChange trojan that affected over four million computers in 2011… This sort of malware works by changing DNS server settings on affected computers, thus...
Jan 17, 2018 | Cloud Consultancy News
BT’s consumer division has today announced new fibre-to-the-cabinet broadband packages that will boost the bandwidth available to customers from a current maximum – from the BT network – of 78 megabits per second (Mbps) to 314Mbps. The packages,...
Jan 16, 2018 | Cloud Consultancy News
Ransomware has been getting a lot of press lately, and understandably so. In recent months, there has been a tidal wave of ransomware attacks targeting numerous well-known businesses, and the threat is expected to continue to wreak havoc across the world in the...
Jan 15, 2018 | Cloud Consultancy News
A flaw in WhatsApp’s group messaging protocol means that, despite its vaunted end-to-end (E2E) encryption, messages can still be read by unwanted eyes, researchers from Germany’s Ruhr University Bochum have found. Encryption has always been one of the more...
Jan 14, 2018 | Cloud Consultancy News
The file-storage company filed papers confidentially to go public, a source close to the company said, for a much-delayed and much-anticipated IPO later this year. The listing, first reported by Bloomberg, will test Dropbox’s most recent valuation, $10 billion, which...
Jan 13, 2018 | Cloud Consultancy News
Cementing January as the worst month of the year, at least for Apple, another bug has been uncovered in MacOS High Sierra. Although not particularly serious, it does reflect badly on the world’s most successful company. Eric Holtam, a Mac developer, posted the...
Jan 12, 2018 | Cloud Consultancy News
Security is a big concern for many users and while most typically think of that as meaning you protect your PC from malware, there are also easy ways to protect your conversations as well. Skype is now testing out a new feature called Private Conversations that...
Jan 11, 2018 | Cloud Consultancy News
The WiFi Alliance has announced the new wireless standard, WPA3, at CES in Las Vegas. The new family of WiFi security technologies comes shortly after WPA2, which every wireless device in the world today uses, was found to be vulnerable to the KRACK exploit. WPA3 will...
Jan 10, 2018 | Cloud Consultancy News
Amazon’s Alexa AI tech is set to be expanded – with a deal in the pipeline for advertising to be pumped direct to users’ devices. According to CNBC, the retail giant has been negotiating with a range of major companies, such as Clorox and Procter...
Jan 9, 2018 | Cloud Consultancy News
Chrome is now the most popular browser across all devices, thanks to Android’s popularity and the rise of Chrome on Windows PCs and Mac computers. As Google continues to dominate our access to the web, information through its search engine, and services like Gmail or...
Jan 8, 2018 | Cloud Consultancy News
The personal data of more than one billion Indians – including thumb prints and retina scans – can be bought online for less than £6, according to an investigation by Indian newspaper Tribune. The data is stored in what may be the world’s largest...