Archives: Business Articles
Employee Qualifications
The qualifications necessary for you, your employees and your security support organisations will vary according to the size, structure, management and IT provisioning of your organisation.
Wi-Fi
Wireless networks have revolutionised the way we work, both in the office, offsite or at home, and when out and about. This page deals with office and home Wi-Fi networks rather than public Wi-Fi / hotspots, which are covered elsewhere on this website. Wireless networks generally make it easier than with wired connections, to use the […]
Ransomware
Ransomware is a form of malware that provides criminals with the ability to lock a computer from a remote location – then display a pop-up window informing the owner or user that it will not be unlocked until a sum of money is paid. Recent well-publicised examples are CryptoLocker, Cryptowall and WannaCry (and variants of these […]
Social Engineering
Social engineering is the route to many types of crime including fraud and identity theft. It refers to the act of manipulating or deceiving someone into certain actions including divulging personal or financial information … a kind of confidence trickery. It exploits elements of human nature such as fear of loss, being protective, wishing to […]
Hactivism
The term hacktivism is used to describe the hacking of a website or social networking page to cause disruption or make a point on politically, socially or ethically motivated grounds.
Firewalls
The internet is effectively a public network, meaning that any connected device can find and connect to any other connected device. A firewall is a barrier between the internet and your computers or network – preventing unauthorised visits to or egress from your systems.
Every organisation relies on email without a second thought, and it is for this reason that it has become such a commonplace method for people to send you unwanted communications that are at best annoying, and at worst harmful to your business.
Downloading & File Sharing
Downloading is a commonplace and very convenient way to obtain and update software as well as documents, pdfs, video, photos, and other files. Downloading is different from streaming, which is where video, music or sound is sent over the internet for you to watch or listen to in real time, rather than being able to be […]
Cyber Liability Insurance
Insurance has long been used by businesses as part of their risk management and disaster recovery plans and there are plenty of statistics that demonstrate that inadequately insured businesses are unlikely to survive major incidents. Until recently most businesses have insured only computers and mobile devices against physical risks such as damage, theft or loss, with […]
Fraud
Businesses and other organisations can be affected by many types of fraud, and it is essential to ensure that you are aware of the risks in your particular organisation, and how to identify and prevent it.