As IT evolves a growing number of companies use decentralised and shadow IT technology in cloud-based solutions. It is essential to understand the attack surface of these landscapes in order to address the risks to the integrity of critical data. Read the full whitepaper by Tom Venables is an SAP Security Architect at Turnkey […]
Cyber-attacks are a constant threat to organisations. Cloud-based communications platforms can help an organisation improve emergency communications and recover from the effects of a cyber-attack. In today’s globalised business environment, organisations of all sizes face the prospect of falling victim to a cyber-attack or IT outage that could cause serious damage to its infrastructure and […]
As the threat of cyber attack grows, major corporations are struggling to keep pace with the tactics of criminal gangs, hacktivists, less ethical governments and even, perhaps cyber terrorists. “Nearly a third of CEOs list cyber security as the issue that has the biggest impact on their company today, yet only half feel prepared for […]
Mobile network operators have long been targets for fraud and revenue risk. The nature of these companies’ businesses – providing huge volumes of communications services to vast numbers of people – mean these companies generate significant revenues. Wherever revenues are large, risk of fraud will be too. Mobile service providers generate revenues in two ways. […]
In February of this year security researchers proved that with a simple USB drop in a hospital it was possible to hack patient records, critical medical equipment and patient monitors. Vital signs could be manipulated, drug doses changed and medical equipment operated remotely. You can find the full whitepaper here by Bryan Lillie, QinetiQ’s Chief Technology Officer.
If you read the news—and more than likely, you read it online—you know that the Internet can be a dangerous place. Seemingly harmless emails in our inboxes can serve as the perfect Trojan horse, waiting to infect our computers with malicious malware or simply hijack our identities. Once-innocuous locations like libraries and local restaurants are […]
This whitepaper provides insight into CCTV systems and cyber attacks from serial entrepreneur, James Wickes. James has 30 years’ experience in IT and is the CEO and co-founder, Cloudview. Across society, visual surveillance plays a vital role in the protection of people, property and assets. But traditional DVR-based CCTV systems leave companies vulnerable to attack […]
Get instant access to the Fresh Business Thinking fact sheet on the General Data Protection Regulation. The General Data Protection Regulation (GDPR) will come into effect on 25 May 2018 and will bring significant changes to data protection rules backed up by massive fines (Up to 4% of turnover). Download your complimentary guide to GDPR […]