29 July 2014

We all know that username and passwords are a good idea if you can persuade yourself or your users to use a complex passwords and to use one …

21 July 2014

Great content can be found in all corners of the Internet, but this doesn’t mean all content should necessarily be accessible at work. Sites with a wealth of …

2 July 2014

For those who don’t already know, there is one anti-virus system that can help when you are infected with Cryptolocker.  You do need to install it before you …

26 June 2014

Phishing attacks continued to be prominent in the first quarter of 2014, including the traditional targets of Paypal and Apple, as well as a disturbing new wave of …

10 April 2014

A serious flaw in OpenSSL was announced on 7th April 2014  (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160).  OpenSSL implements the Secure Sockets Layer and Transport Layer Security protocols and is widely used to …

19 December 2013

In 2012, we all became pretty familiar with hackers, getting to know their groups like Anonymous, Lulzsec, and others like them.  The activities of these high-profile hackers have …

19 December 2013

Increasingly, VoIP solutions are under attack.  We see IP PBX’s being targeted by toll fraud, DDoS or being hacked as companies keen to benefit from the undoubted advantages …

19 December 2013

Frequently there is a lot that can be done with existing equipment to improve an organisation’s security posture.  This not only improves general security, it can help an …

19 December 2013

Use Cases, used well   Security Information and Event Management (SIEM) can be a massively useful tool in helping organisations discover Spam bots on their networks, identify malpractice …

19 December 2013

When people talk about Virtual LANs (VLANs), they tend not to focus on the security features of this versatile network topology.  However, there are several tangible security vulnerabilities …