• Smart devices

    Hidden Risks of Smart Devices: Why Your Home Automation Could Be a Security Nightmare

    In recent years, there has been a surge in “smart” versions of traditional home devices. Devices once purely mechanical or locally controlled are now connected to the network/internet, often relying on cloud-based applications for enhanced functionality. From locks and security cameras to doorbells and home appliances, these connected devices aim to make life easier and […]

  • Common scams

    Common scams in 2024

    Forbes has listed the common scams currently affecting users and establishments Ticket scams: Selling fake tickets to events.Impersonation scams: Pose as an authoritative figure to transfer funds or get information.Loan fee fraud: Charging a fee for fake loans.Authorised push payment scams: Getting users to transfer moneyParcel delivery scams: Additional fee for delivery of a parcelIdentity […]

  • DDOS

    DDOS and Cloudflare

    An issue on Microsoft DDoS protection escalated the Distributed Denial-of-Service (DDoS) attack and caused a 10 hour outage, with multiple organisations reporting issues on 30th July 2024. What is Distributed Denial-of-Service (DDoS) attack?In a distributed denial-of-service (DDoS) attack, a type of cyberattack, an attacker overwhelms a website, server, or network resource with malicious traffic. As […]

  • OWASP

    Cryptography techniques, correct implementation (OWASP Top 10)

    Cryptography is the study of secure communication and is used to protect information from unauthorised access. Cryptography defines securing a message using the encryption and decryption methods. Encryption is one of the main techniques used in cryptography. It converts plain text into cipher text. From readable to unreadable. However blind and incorrect implementation of these […]

  • OWASP

    Vulnerable and Outdated Components (OWASP top 10)

    OWASP (The Open Worldwide Application Security Project) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security.The OWASP Top 10 is a regularly updated list of some of the most critical risks in application security. Vulnerable and Outdated Components is […]

  • Guideline for preventing scams targeting employees and organizations

    Overview In recent incidents, company employees are being targeted on WhatsApp by an unknown contact posing as eg the CEO. We have ourselves faced this issue however thanks to our robust security measures, none of the employees contacted fell victim to this fraudulent attempt. Immediate reporting to the team and blocking the unknown number showcased […]

  • Kaizen Continuous improvement

    How Kaizen, continuous improvement, helped with a great approach to optimisation and security.

    The challenge?Every company/organisation has internal tasks which include organization goals, compliances, governing body requirements etc which need to be accomplished. These could be related to Finance Human Resource Documentation Security Operation Compliance Infrastructure In the mix of so many daunting challenges or issues it’s easy to get lost or push it for the future, when […]

  • Our festive offer of £1,000 discount for vulnerability / penetration test

    Years back we started our security division because we noted a gap in the market. Regulatory body expected website and web service owners to ensure various security measures including conducting annual ethical hack (vulnerability/penetration test) however the charges for these was expensive. We felt the need for many of our clients and could not find […]

  • Company / employee handbook for vision and compliance policies and procedures

    What is a company/employee handbook? A company handbook is a document which has all the key information that an employee, and others associated with the company might need for compliance and for understanding the companies vision, policy and procedures for general operations and data protection etc. It helps having a central document easily accessible by […]


1 2 3 8
Next Page