A troubled season for Leicester City FC just got worse, with the club announcing that a cyber criminal has broken into the club’s online shop and stolen fans’ financial details. The breach occurred between 23 April and 4 May 2019, …
A version of this blog was originally published on 8 January 2018. On average, one in ten emails is a phishing scam. With all that experience, you’d think we’d be pretty good at spotting malicious messages by now. According to …
Phishing is one of the most longstanding and dangerous methods of cyber crime. It uses deceptive messages to trick victims into clicking bogus links, downloading malicious attachments or sending sensitive information. Despite what people think they know about phishing, they …
Last month marked the first anniversary of the GDPR (General Data Protection Regulation) taking effect, but many organisations are still struggling to meet their compliance requirements, according to a Thomson Reuters report. GDPR+1 Year: Business Struggles with Data Privacy Regulations …
The UK is more vulnerable to cyber attacks than ever before, a Commons report has warned. MPs said that the UK’s vast network of digital infrastructure is vulnerable to cyber attacks and that the threat has been exacerbated by poor …
A version of this blog was originally published on 15 August 2017. We often talk about the benefits of ISO 27001 certification but don’t always expand on the more immediate benefits associated with implementing an ISMS (information security management system). …
OGusers, a popular forum among cyber criminals, has been raided by a rival group. The incident exposed the email addresses, hashed passwords, IP addresses and private messages of nearly 113,000 members of the online criminal hacking community. However, the damage …
The cyber security story for May 2019 is much the same as it was last month, with one mammoth breach raising the monthly total. The offender this time is the First American Financial Corp., which breached sixteen years’ worth of …
Do your research Ditch the jargon and learn how to implement an ISMS (information security management system) in nine steps with our free guide. We’ve also got a handy pocket guide – Nine Steps to Success – An ISO 27001 …
Just when you thought you were getting the hang of the GDPR (General Data Protection Regulation), you learn that things are even more complicated. That’s been the reaction of many law enforcement bodies that have recently learned about their compliance …