Foration Blog

Paul Weeden

Paul Weeden
Founder & Managing Director at Foration. IT and technology fixer.

Recent Posts

Prepare or repare? The risks and costs of cyber-attack compared

For any new service provider or proposed systems update, there’s one important question to consider: will the changes on the table bring added value to the business? Cyber security measures are no exception to this rule.

What risks are you faced with? What are the likely costs of being hit by a breach? How do the costs of prevention stack up against the cost of clear-up? We take a look…

A hacker's 3-step IT checklist for getting and STAYING protected

Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.

Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.

Could Hailstorm be the next big cyber-threat to business?

When it comes to cyber security, there has always been a strong ‘cat and mouse’ element: with the right help, businesses become better able to protect their data and systems from security threats - so criminals respond to this by trying to find new ways to deliver their payloads. Evidence suggests that the latest threat comes in the form of a spamming technique dubbed “hailstorm”.

What do IT experts do to secure their own computer?

The risk of hacking, malware or other cyber-attack is a pervasive and potentially devastating part of modern working life.  A threat from which everyone is at risk; every organisation, every industry sector. Including those working within the realm of IT and internet security. Which is why they practice what they preach; taking every precaution possible to prevent the damage that can arise from an attack.

What can we learn from China's "Draconian" cyber-security bill?

In November of last year, China’s parliament rubber-stamped a controversial cyber security law. The legislation, which is due to become effective from June 1 2017, is designed to combat what the Chinese government regards as the critical threats of hacking and cyber terrorism.

In effect, those businesses who wish to make inroads into the Chinese market are faced with a choice: either comply with the new rules (thereby allowing the Chinese authorities access to proprietary information which was previously private) - or bar themselves from the market.

4 companies that paid a heavy price for a laissez-faire approach to IT security

Federation of Small Businesses (FSB) data suggests that two thirds of small firms have been a victim of cyber crime in the last two years. The message is clear: UK business owners need to resist the temptation of assuming that an IT security breach is something that happens to ‘other people’.

Yet while smaller organisations often bear the brunt of cyber crime, it’s the crimes that affect the bigger players that tend to grab the headlines. So what can these high profile data breaches teach the rest of us? We take a look…

Why would anyone want access to your email account?

There was a time when email was pretty much the sole means of electronic communication used by business. These days, even with the growth of social and a host of specialist messaging and collaboration tools available, email remains as important as ever. There are an estimated 2.5 billion business email users worldwide - and that number is on the increase.

3 ways that phishing will evolve in 2017

The rise in spear-phishing as a means to deliver potentially devastating malware to businesses has been one of the more troubling trends in cyber-security over the past year. And it’s a trend that looks likely to continue. Although, as experience tells us, these types of threats tend not to stand still, ever evolving to maintain it's capability to cause chaos.

Foration's Tips and Predictions for Compliant IT in 2017

As we approach the end of a year of dramatic change, attention turns to the future. To look at the coming year and what it may hold in store for IT services. Particular attention will be in relation to IT compliance. The need for systems and organisations to operate on the right side of the regulations in an era of data protection and cyber-threats will be more acute than ever.

Not so Merry!  4 security issues to look out for over Christmas.

Just as many of us are winding down for a well-earned break, this is exactly the time of year when cyber criminals are ramping up their activity.

Last year’s festive holiday season was dubbed “CyberCriminal Christmas” as online fraud attempts spiked between November and January. But it’s not just retailers that need to be wary; businesses of all types need to be wary of letting their guard down.

Subscribe to our Blog