Foration Blog

Crimeware as a Service - What you need to know to protect your company

Many years ago, hacking and cybercrime was often the work of skilled individuals - typically programmers and software engineers working in their own time to create the tools they needed to breach security systems.

While these attacks were often successful due to the lack of public awareness about cybercrime, they were limited in scale due being perpetrated by individuals or small groups. Today, headlines around the world have drawn attention to the fact that cyber attacks have grown in their size and scope, with thousands of private users and businesses being targeted every day by criminals attempting to disrupt services and steal data.

Security Orchestration for Improved Incident Response

Managing incident response is an important task for any IT or security manager, making a plan of action for staff to follow in the event of cyber attacks or security breaches and using the tools at your disposal to mitigate any risks. To assist with this sort of planning, two main approaches and technologies have emerged - autonomous incident response and security orchestration.

What WannCry taught us about the true nature of cyber threats

Once again, cyber security is front-page news. Dubbed WannaCry, the ransomware attack unleashed earlier this month has affected an estimated 200,000 (and counting) computers across the globe. The NHS, Scottish Power, Renault, O2 and the China National Petroleum Corporation are just a handful of the organisations affected.

Significant though the attack was, it wasn’t exactly surprising - and nor should it be thought of as a once-in-a-blue-moon event.

Once and for all! Is the Cloud secure?

Cyber-breaches, hacking, and other online attacks on our technology and IT systems is a part of everyday life. Barely a day goes by without report of an organisation, corporation, or institution being brought to its knees by a malicious attack. And when it has impact on those institutions that ‘really’ matter to us, as we’ve seen with the NHS ransomware attacks, we all sit up, take notice, and ponder just how safe we all are, when operating in an online environment.

How to get Cybersecurity buy-in from the C-Suite

Cyber-threats are one of the great risks to businesses of all sizes, across all locations. And this risk is going to increase ever more so as we head into the heart of 2017. Indeed, along with the uncertainty over Brexit, cyber-crime is seen as one of THE biggest threats facing UK business this year.

And yet, despite both recognition that the risk is real, the recent high profile attacks at Tesco Bank, Yahoo and others suggest that too many business leaders are not giving the threat the serious levels of consideration that it warrants. As perhaps highlighted by the fact that almost three-quarters of SME leaders admitted that they had no adequate cover in place to protect against a breach of their system.

3 tips for detecting a CryptoLocker attack

If you’re not already aware, then CryptoLocker is a particularly nasty piece of malware with the potential to cause major disruption and heavy costs to your business.

3 ways to blow up the chances of email spam in Office 365

Email is a point of vulnerability for an IT network.  A primary method for attacking. Phishing and spear-phishing messages designed to catch the user off-guard and deliver routes into the system for hackers, malicious files, and ransomware. All designed to create havoc, harm and untold cost to your organisation.

Not so phishy! The increasingly subtle email attacks exposing human frailties

It might be one of the older forms of cyber-threat, but Phishing is on the increase. The first quarter of the year saw a rise in excess of 200% from the tail-end of the previous year. With cyber-security specialists Mimecast reporting that phishing accounts for 90% of all hacking attacks. It's an alarming rise and cause for concern.

Subscribe to our Blog

Recent Posts