-
Windows 10 End of Life and the Challenges of Upgrading to Windows 11: What Businesses and Consumers Need to Know
Windows 10 will officially reach its end of life (EOL) on October 14, 2025. After this date, Microsoft will no longer provide technical support or security updates, leaving Windows 10 systems vulnerable to security threats, malware, and other issues. While Windows 10 will still function after the EOL date, continuing to use it poses serious […]
-
Hidden Risks of Smart Devices: Why Your Home Automation Could Be a Security Nightmare
In recent years, there has been a surge in “smart” versions of traditional home devices. Devices once purely mechanical or locally controlled are now connected to the network/internet, often relying on cloud-based applications for enhanced functionality. From locks and security cameras to doorbells and home appliances, these connected devices aim to make life easier and […]
-
Common scams in 2024
Forbes has listed the common scams currently affecting users and establishments Ticket scams: Selling fake tickets to events.Impersonation scams: Pose as an authoritative figure to transfer funds or get information.Loan fee fraud: Charging a fee for fake loans.Authorised push payment scams: Getting users to transfer moneyParcel delivery scams: Additional fee for delivery of a parcelIdentity […]
-
DDOS and Cloudflare
An issue on Microsoft DDoS protection escalated the Distributed Denial-of-Service (DDoS) attack and caused a 10 hour outage, with multiple organisations reporting issues on 30th July 2024. What is Distributed Denial-of-Service (DDoS) attack?In a distributed denial-of-service (DDoS) attack, a type of cyberattack, an attacker overwhelms a website, server, or network resource with malicious traffic. As […]
-
Cryptography techniques, correct implementation (OWASP Top 10)
Cryptography is the study of secure communication and is used to protect information from unauthorised access. Cryptography defines securing a message using the encryption and decryption methods. Encryption is one of the main techniques used in cryptography. It converts plain text into cipher text. From readable to unreadable. However blind and incorrect implementation of these […]
-
Vulnerable and Outdated Components (OWASP top 10)
OWASP (The Open Worldwide Application Security Project) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security.The OWASP Top 10 is a regularly updated list of some of the most critical risks in application security. Vulnerable and Outdated Components is […]
-
Guideline for preventing scams targeting employees and organizations
Overview In recent incidents, company employees are being targeted on WhatsApp by an unknown contact posing as eg the CEO. We have ourselves faced this issue however thanks to our robust security measures, none of the employees contacted fell victim to this fraudulent attempt. Immediate reporting to the team and blocking the unknown number showcased […]
-
How Kaizen, continuous improvement, helped with a great approach to optimisation and security.
The challenge?Every company/organisation has internal tasks which include organization goals, compliances, governing body requirements etc which need to be accomplished. These could be related to Finance Human Resource Documentation Security Operation Compliance Infrastructure In the mix of so many daunting challenges or issues it’s easy to get lost or push it for the future, when […]
-
Our festive offer of £1,000 discount for vulnerability / penetration test
Years back we started our security division because we noted a gap in the market. Regulatory body expected website and web service owners to ensure various security measures including conducting annual ethical hack (vulnerability/penetration test) however the charges for these was expensive. We felt the need for many of our clients and could not find […]