Serviceteam IT Security News

*Sorry, no chocolate

There are some words and phrases related to cyber security which are bandied...
Serviceteam IT Security News

SugarCRM Wins PC Magazine’s 2016 Business Choice Award for Best CRM Service

SugarCRM has been named the Best CRM Service by PC Magazine readers in the publication’s annual business choice awards. For the second year in a row,  SugarCRM rose above other providers with outstanding scores for overall satisfaction,…
Serviceteam IT Security News

Assuring Smart Meters

Several years ago, as part of the Smart Meter Implementation Project, we embarked...
Serviceteam IT Security News

75% of healthcare industry hit with malware, report

The healthcare vertical is at particular risk from ransomware. This is just one of the findings of the "2016 Healthcare Industry Cybersecurity Report," a just-released survey from SecurityScorecard. Source: SC Magazine 75% of healthcare industry…
Serviceteam IT Security News

Active Cyber Defence – tackling cyber attacks on the UK

  On 1st November, the Chancellor announced the Government's new National Cyber Security...
Serviceteam IT Security News

The Phishing threat following data breaches

Key Points Recent reporting of data breaches affecting customers in the UK reminds...
Serviceteam IT Security News

Fraud report names most sophisticated cyber-attacks globally in 2016

Fraud is in a constant state of evolution to stay a step ahead of the defences deployed to stop it. Source: SC Magazine Fraud report names most sophisticated cyber-attacks globally in 2016  
Serviceteam IT Security News

Student discovers security flaw in Virgin Media recruitment system

A student has discovered a security vulnerability in the software which Virgin Media uses for recruitment and job applications. Source: SC Magazine Student discovers security flaw in Virgin Media recruitment system
Serviceteam IT Security News

Phishing emails promising invites to cybersecurity conference actually dispersing malware

Threat actors have been discovered trying to infect security-minded individuals with a trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks' Cyber Security Summit in Jakarta, Indonesia. Source:…
Serviceteam IT Security News

Shadow Brokers claim to leak NSA cyberespionage targets

The Shadow Brokers hacking group has leaked another batch of NSA-linked data containing a list of servers linked to cyberespionage hacking programs. Source: SC Magazine Shadow Brokers claim to leak NSA cyberespionage targets
Serviceteam IT Security News

EU privacy regulators query Yahoo CEO on breach

Yahoo CEO Marissa Mayer was sent a letter from a watchdog group overseeing privacy regulators in the European Union seeking answers on the affect of a massive breach the company experienced. Source: SC Magazine EU privacy regulators query Yahoo…
Serviceteam IT Security News

Protecting your organisation from ransomware

Ransomware is a growing global cyber security threat, and one which could affect any organisation...
Serviceteam IT Security News

Macro Security for Microsoft Office

This guidance describes how administrators can help protect their systems from malicious Microsoft...
Serviceteam IT Security News

What can the NCSC do for you?

If you’re browsing this website, you might be wondering how the new National...
Serviceteam IT Security News

Digital service security

We use digital services to manage just about every aspect of our lives....
Serviceteam IT Security News

Whaling: how it works, and what your organisation can do about it

Whaling is a highly targeted phishing attack - aimed at senior executives - masquerading as...
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News

Threat intelligence: executive summary & infographic

A one page introduction to the importance of threat intelligence, and an infographic...
Serviceteam IT Security News

PIANOS: Protecting Information About Networks, the Organisation and its Systems

Electronic material, common to all IT infrastructures, is used by intruders to understand...
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News
Serviceteam IT Security News