Blog

Solving Ransomware with AV...the definition of insanity?

Solving Ransomware with AV...the definition of insanity?

The speed at which ransomware is proliferating is mind blowing. In 2015, SonicWall’s Global Response Intelligence Grid recorded around 3.8 million attacks. By last year, that had grown to 638 million. Yes, you read it right – 638 million! That’s a staggering 167 times the number of attacks in 2015. Wow! And it’s easy to see why. Ransomware is particularly profitable for hackers. It’s a nasty type ...
Cloud Security - How is 2017 Shaping Up

Cloud Security - How is 2017 Shaping Up

With January rapidly becoming a distant memory, and as all those New Year good intentions get left by the wayside, I am pleased to report the race to the cloud continues apace.
Why it’s time to ditch the password...

Why it’s time to ditch the password...

Given that passwords are on the front line of defence in the security of corporates and individuals, it’s mind boggling how elementary some people’s passwords are. Some recent research by LeakedSource, delved into the frequency of use of LinkedIn’s 10 most pathetic passwords. Topping the list is “123456” with an incredible 753,305 LinkedIn users, using this most perfunctory of passwords.
Two’s company but it’s no longer enough

Two’s company but it’s no longer enough

Cyber Security is now well and truly on the map. Politicians wax lyrical about how they’re fighting it, entire supplements of every major Sunday newspaper are dedicated to it and in general, the world is that little bit more savvy, I’m delighted to say.
Targeting hospitals? The lows that hackers stoop to...

Targeting hospitals? The lows that hackers stoop to...

The morals of hackers sank to new lows last week, when three hospitals across the UK were targeted with ransomware in malicious cyber attacks. The upshot was that all operations, procedures and appointments were cancelled, affecting over 1000 patients.
CensorNet and the Statutory Duty on Radicalisation

CensorNet and the Statutory Duty on Radicalisation

The Department for Education’s statutory guidelines (“Keeping Children Safe in Education”) are now in force. For the first time the guidelines include the subject of the legal obligations on the school arising under the Counter Terrorism and Security Act 2015. On this subject the statutory guidelines are explicit: “Protecting children from the risk of radicalisation should be seen as part of schoo...
A CIO and an Entrepreneur walk into a bar…

A CIO and an Entrepreneur walk into a bar…

One arbitrary Google search of ‘Shadow IT’ will instantly present a buffet of opinion; not to mention some of the most spurious marketing images in the history of the internet. That’s the trouble with the tech sector, a genuine issue arises and before you can say the words ‘Please. Just. Stop’; everyone (and I mean everyone) has a ‘solution’ and a ‘marketing strap-line’ for it. You only have to lo...
CensorNet shortlisted for two Computing Security Awards

CensorNet shortlisted for two Computing Security Awards

We’re delighted to say that we’ve been named a finalist in two categories at this year’s Computing Security Awards! The awards recognise the best security solutions, companies, resellers and individuals in the industry – and we’re in the running for Cloud Security Solution of the Year and SME Security Solution of the Year.
The NIST draft guidelines have ignited an interesting debate

The NIST draft guidelines have ignited an interesting debate

The recent NIST draft report has, we feel quite rightly, kicked off an interesting debate around the quality of SMS authentication. This is a discussion that has many nuances, so we wanted to help by trying to clarify a few things here.
Five ways your apps are putting you at risk – and what to do about it...

Five ways your apps are putting you at risk – and what to do about it...

Businesses are lapping up mobile and cloud applications faster than iPads get snapped up at an Apple flash sale. Buoyed by seeing the impact applications have had on the lives of consumers, businesses are keen to benefit from the collaboration, flexibility and productivity boost applications bring. But they come with a serious risk warning.
Behaving Badly

Behaving Badly

As any law-enforcement advisor will tell you, criminals succeed mainly because they understand the human psyche. Knowing how to manipulate somebody into leaving a backdoor open is still the ultimate weapon in any criminal’s arsenal. Cyber-crime is no exception. In fact, as criminal acts go that rely on ‘how we work’ it’s probably the market leader. Increasingly sophisticated, annoyingly clever and...
Here phishy, phishy

Here phishy, phishy

The thing about well known phishing scams is they’ve essentially become industry comedy punchlines which also puts them in danger of being diluted as a meaningful and growing threat. If you even so much as mention to a colleague the Nigerian Prince offering you many many monies to leave the country, you will instantly engage in a series of one-upmanship debates on who’s received the most spurious ...
'Catch us if you can' - What CensorNet's acquisition of SMS Passcode really means

'Catch us if you can' - What CensorNet's acquisition of SMS Passcode really means

If we’ve done our job well and the PR wheels are spinning as they should, then you’ve probably seen the recent press release detailing CensorNet’s acquisition of SMS Passcode. To say that I’m feeling a little bit pleased about it, would be the textbook definition of a gross understatement.
Cloud Security issues aren’t unknown

Cloud Security issues aren’t unknown

When Cloud was the new kid on the block, the risk of adoption was simply too variable and therefore untenable but that didn’t really matter. It was gathering such momentum the security market simply couldn’t keep up. So in line with tradition, the easiest option was to get the big red stamp out and mark it ‘unsafe’ and hope it would go away.