Foration Blog

How can you guide staff in using uber-secure passwords on your systems?

Passwords are often referred to as the first line of defence in protecting a wide range of business systems from security breaches.  Companies need to have a strong, easily understood password policy in place, so employees understand their personal responsibilities.

In isolation, password barriers are insufficient as a means of keeping your network secure. It may be worth reviewing your infrastructure to consider whether password protection should be bolstered - or replaced - with more suitable measures.

Why Trump's "Offline" approach to IT security is massively flawed

“No computer is safe.” Or, at least, not in the eyes of US President, Donald Trump. At his first New Year’s Eve reception in his new role, the Commander-in-Chief suggested that the only truly effective means of protection against hackers and prying eyes is to maintain a massive air gap.

So is there some truth in what the President is saying? Is it a case of offline equals ‘good’ and online equals ‘bad’ when it comes to data security?

A hacker's 3-step IT checklist for getting and STAYING protected

Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.

Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.

Could Hailstorm be the next big cyber-threat to business?

When it comes to cyber security, there has always been a strong ‘cat and mouse’ element: with the right help, businesses become better able to protect their data and systems from security threats - so criminals respond to this by trying to find new ways to deliver their payloads. Evidence suggests that the latest threat comes in the form of a spamming technique dubbed “hailstorm”.

What do IT experts do to secure their own computer?

The risk of hacking, malware or other cyber-attack is a pervasive and potentially devastating part of modern working life.  A threat from which everyone is at risk; every organisation, every industry sector. Including those working within the realm of IT and internet security. Which is why they practice what they preach; taking every precaution possible to prevent the damage that can arise from an attack.

4 companies that paid a heavy price for a laissez-faire approach to IT security

Federation of Small Businesses (FSB) data suggests that two thirds of small firms have been a victim of cyber crime in the last two years. The message is clear: UK business owners need to resist the temptation of assuming that an IT security breach is something that happens to ‘other people’.

Yet while smaller organisations often bear the brunt of cyber crime, it’s the crimes that affect the bigger players that tend to grab the headlines. So what can these high profile data breaches teach the rest of us? We take a look…

Why would anyone want access to your email account?

There was a time when email was pretty much the sole means of electronic communication used by business. These days, even with the growth of social and a host of specialist messaging and collaboration tools available, email remains as important as ever. There are an estimated 2.5 billion business email users worldwide - and that number is on the increase.

3 ways that phishing will evolve in 2017

The rise in spear-phishing as a means to deliver potentially devastating malware to businesses has been one of the more troubling trends in cyber-security over the past year. And it’s a trend that looks likely to continue. Although, as experience tells us, these types of threats tend not to stand still, ever evolving to maintain it's capability to cause chaos.

Not so Merry!  4 security issues to look out for over Christmas.

Just as many of us are winding down for a well-earned break, this is exactly the time of year when cyber criminals are ramping up their activity.

Last year’s festive holiday season was dubbed “CyberCriminal Christmas” as online fraud attempts spiked between November and January. But it’s not just retailers that need to be wary; businesses of all types need to be wary of letting their guard down.

Not so phishy! The increasingly subtle email attacks exposing human frailties

It might be one of the older forms of cyber-threat, but Phishing is on the increase. The first quarter of the year saw a rise in excess of 200% from the tail-end of the previous year. With cyber-security specialists Mimecast reporting that phishing accounts for 90% of all hacking attacks. It's an alarming rise and cause for concern.

Subscribe to our Blog