News
- All
- Business Continuity Planning
- Compliance and Regulations
- Cybersecurity Best Practices
- Highlights
- Industry-Specific Security
- Others
- Risk Management Strategies
A New Cyber Security Threat to IoT (Internet of Things) and Cloud Based Services Discovered
CloudSEK cybersecurity experts have recently discovered a significant threat with AndroxGh0st malware, which has now integrated the Mozi botnet to target IoT and cloud-based services. This combination expands AndroxGh0st’s reach, making it a powerful tool for cybercriminals to compromise various devices and networks, including cloud platforms like AWS and TwilioSendGrid. By merging with Mozi’s capabilities, … Read more
Social Engineering: Understanding Cybersecurity’s Human Element
What is Social Engineering? Social engineering is among the most dangerous forms of cybersecurity attacks, often targeting psychological manipulation rather than technical systems. While advanced security systems protect software and hardware, these measures become ineffective when the human element is compromised. Social engineering is a cybersecurity concern for individuals and businesses alike, as it bypasses … Read more
How to Use Public Wi-Fi Safely: Top Security Tips & Common Risks
Internet is deeply ingrained in the way we interact and do business in the modern world. It is now a necessity and we expect to have internet connections everywhere we go. Hence, the availability of public Wi-Fi networks has also become essential, both in the UK and globally, millions rely on it daily for everything … Read more
How to Choose the Right Cybersecurity Consultant: 5 Things to Consider
Modern businesses are rapidly expanding their digital landscape, however, as a digital footprint increases so too does the cyber threat surface it is open to, therefore, it is crucial for businesses to safeguard their network and critical information. One way to achieve this is through support from a professional cybersecurity consultant. Generally, a consultant is … Read more
Information Security Management System (ISMS)
Information is one of the most valuable assets for any business. Whether its customer data, financial records, intellectual property, or confidential information, keeping this information secure is essential to maintaining trust and ensuring smooth business operations. However, managing the security of this information can be challenging, especially with the constant threats businesses face from cyber-attacks … Read more
Network Rail Wi-Fi Cyber Attack: What Happened and Why It Matters
On 25 September 2024, a cyber security breach targeted the public Wi-Fi services at 19 major UK train stations, including London Euston, Manchester Piccadilly, Glasgow Central, and Birmingham New Street, which led to a temporary shutdown. The attack has been described as cyber vandalism, which appears to have been more of a system defacement than … Read more
Is your business safe from the increasing Software as a Service (SaaS) Attacks?
Is your business safe from the increasing Software as a Service (SaaS) Attacks? If your company relies on cloud-based apps to manage day-to-day operations, you may unknowingly be sitting on a ticking time bomb. For many companies, it’s not a matter of if they’ll be attacked but when. Organisations utilising SaaS platforms to conduct their … Read more
An overview of the Cyber Assessment Framework for organisations for Enhanced Cybersecurity Resilience
Why the necessity? In today’s digital age, cybersecurity is vital to keeping our Critical National Infrastructure (CNI) safe. The world today relies heavily on a well-functioning Network and Information System (NIS) which plays a vital role in our critical infrastructures like transport, energy supplies, logistics and healthcare. Time and time again, we have experienced numerous … Read more
NHS Ransomware Attack: Could a £6 Million Fine Have Been Prevented?
On 7 August, 2024, the Information Commissioner’s Office (ICO) announced a provisional £6 million fine for Advanced, a UK software provider for the NHS. This fine stems from initial findings that the company failed to adequately protect sensitive data, leading to major disruptions in NHS services. However, it’s important to note that these findings are … Read more