Foration Blog

Prepare or repare? The risks and costs of cyber-attack compared

For any new service provider or proposed systems update, there’s one important question to consider: will the changes on the table bring added value to the business? Cyber security measures are no exception to this rule.

What risks are you faced with? What are the likely costs of being hit by a breach? How do the costs of prevention stack up against the cost of clear-up? We take a look…

A hacker's 3-step IT checklist for getting and STAYING protected

Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.

Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.

Could Hailstorm be the next big cyber-threat to business?

When it comes to cyber security, there has always been a strong ‘cat and mouse’ element: with the right help, businesses become better able to protect their data and systems from security threats - so criminals respond to this by trying to find new ways to deliver their payloads. Evidence suggests that the latest threat comes in the form of a spamming technique dubbed “hailstorm”.

What can we learn from China's "Draconian" cyber-security bill?

In November of last year, China’s parliament rubber-stamped a controversial cyber security law. The legislation, which is due to become effective from June 1 2017, is designed to combat what the Chinese government regards as the critical threats of hacking and cyber terrorism.

In effect, those businesses who wish to make inroads into the Chinese market are faced with a choice: either comply with the new rules (thereby allowing the Chinese authorities access to proprietary information which was previously private) - or bar themselves from the market.

3 ways that phishing will evolve in 2017

The rise in spear-phishing as a means to deliver potentially devastating malware to businesses has been one of the more troubling trends in cyber-security over the past year. And it’s a trend that looks likely to continue. Although, as experience tells us, these types of threats tend not to stand still, ever evolving to maintain it's capability to cause chaos.

Not so Merry!  4 security issues to look out for over Christmas.

Just as many of us are winding down for a well-earned break, this is exactly the time of year when cyber criminals are ramping up their activity.

Last year’s festive holiday season was dubbed “CyberCriminal Christmas” as online fraud attempts spiked between November and January. But it’s not just retailers that need to be wary; businesses of all types need to be wary of letting their guard down.

10 questions to ask your cloud provider about FCA compliance

While the Financial Conduct Authority (FCA) have given their approval for companies to outsource their IT and data storage to third party cloud providers, the consent comes with a number of guidelines, issued to ensure that such providers remain compliant.

Subscribe to our Blog