Advice

The Unified Kill Chain: Part 2

In this series, we are looking through the Unified Kill Chain. In the previous part, we looked at two previous attempts to model the behaviour of a cyber attacker. Both were ultimately flawed, and in this part we will introduce a third proposed model which combines the best of both: the Unified Kill Chain.

The Unified Kill Chain: Part 2 Read More »

How to Handle SaaSS: Part 1

We’ve previously discussed the nature of ‘the Cloud’—a.k.a. ‘someone else’s computer’—and how it may have an impact on your business decisions, particularly when it comes to file storage. However, ‘the Cloud’ is a term that encompasses many disparate offerings, from the lowest-level Infrastrucutre-as-a-Service (IaaS) to the increasingly popular Software-as-a-Service (SaaS) model. In this article, we will focus on what a SaaS product actually is, and what that may mean for you and your company.

How to Handle SaaSS: Part 1 Read More »

What is an APT?

A lot of cyber security discussion lately is centred around the actions and identities of a range of Advanced Persistent Threats (APTs). You may have found yourself wondering just what these threats are, what differentiates them from the more bogstandard kinds of threat that you are used to and who they pose the most risk to.

What is an APT? Read More »

Storage in the Cloud: Part 2

In the previous part, we discussed what the Cloud—particularly when used for storage purposes—really is, and some security concerns that may arise from this better understanding. In this second part, we will run through some more points for ensuring that your file storage procedures are secure, and present an analogy to help you think about your processes.

Storage in the Cloud: Part 2 Read More »

Storage in the Cloud: Part 1

Remember back to when you were little, and you had just found out that Santa Claus wasn’t real, or the tooth fairy, or the Easter bunny (if you are only just learning this now, I apologise). Get ready to relive that experience today, because I am going to let you in on one of the tech. industry’s dirty secrets. Ready? Here goes: the Cloud doesn’t exist. I imagine I’ve just blown your socks off, so I’ll give you a moment to go pick them back up.

Storage in the Cloud: Part 1 Read More »

Information Classification

Information is power, as the famous saying goes. Information is the lifeblood of a business, as well as a tantalising target for an attacker. All businesses will find themselves dealing with different types of information, from things that they are happy to make public to things they would rather keep under wraps. How can you ensure that all such items are properly labelled, so that all employees (and anyone else who gets their hands on them) will know how to handle them? The answer is information classification.

Information Classification Read More »

The Principle of Least Privilege

One of the most fundamental tenets of information security is the Principle of Least Privilege. First formulated by Jerome Saltzer for a 1974 Communications of the ACM article, the Principle states that ‘every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.’ What does this mean for a business and its employees?

The Principle of Least Privilege Read More »

Offboarding Employees

It is a fact of business life that employees may, one day, cease to be a part of your organisation. There may be many reasons for this, and the separation may be more or less mutual; more or less amicable. The one thing that all separations have in common is the need for you to have policies and procedures to be in place that will ensure a smooth transition, without leaving yourself vulnerable.

Offboarding Employees Read More »

New BSIA Guidance Overview

The British Security Industry Association (BSIA), which claims to represent a membership ‘responsible for more than 70% of privately provided UK security products and services (by turnover)’, released in early January a document titled Cyber secure it – Best practice guidelines for connected security systems with the aim of ‘summaris[ing] current guidelines to minimise the exposure to digital sabotage of network connected equipment, software and systems used in electronic security systems.’ Here, we will give you a brief overview of the guidance.

New BSIA Guidance Overview Read More »

DNS Hijacking

You may be wondering what ‘DNS hijacking’ is, and how to secure your own company’s sites. Even if you are not in one of the industries currently being targeted, it is nonetheless important that you secure yourself regardless.

DNS Hijacking Read More »

Threats You Might Not Have Thought Of: Part 2

In the previous part of this series, which covers some of the weirder and wackier parts of your business that may nonetheless prove to be your Achilles’ heel when it comes to cyber attack, we discussed the threat posed by printers. This time, it’s the turn of something you probably even less likely to consider when assessing your level of vulnerability—your air con.

Threats You Might Not Have Thought Of: Part 2 Read More »

SMEs: Easy Pickings and Collateral Damage

If you work within, or even run your own, SME, it may be tempting to consider yourself protected from the risk of cyber attack by your size. If you only have a handful of customers, or turnover that measures in the hundreds of thousands rather than the millions, you may believe that attackers will simply pass you over in favour of larger, potentially more lucrative targets. This can leave you vulnerable for a couple of reasons, which we’ll talk about here.

SMEs: Easy Pickings and Collateral Damage Read More »

Scroll to Top