fbpx

Latest Security Opinions


Channel Island hacking activity post invasion of Ukraine

There are no signs that these threats are going to subside at any point in the near future, with hackers having a strong financial incentive to continue. Even at organisations that have solid cyber defences, it is still possible for hackers to breach these firewalls and damage the company.


Andrew Bartlam of Orca discusses how to manage ‘Alert Fatigue’ in cloud security

The lift-and-shift method of cloud adoption has also contributed to the number of security vendors engaged by a business. Often, when an application was migrated to the cloud, the security solution was migrated alongside the application that it served on-premise. It can be difficult to dedicate resources to evaluating solutions that are already in place.


The rise of Israeli Cyber-Security firms

Perhaps the most significant difference in Israel compared to other leading cybersecurity nations is the value placed on cybersecurity in the education sector. Not only was Israel the first country to offer cybersecurity as an elective for high schoolers but it also established the first PhD solely in cybersecurity.


UK Government’s push towards a cyber security eco-system in 2022

The imperatives of the Cyber Security Strategy and the new legislation in reporting breaches signifies an era of intensified vigilance and transparency for the UK. Add to this the directive to feed a talent-pipeline and the government’s ambition for a tech’ ecosystem, that will reinvigorate the economy, becomes a virtual reality.


Top malware threats of 2021 and ways to protect your device in 2022

Cyber attackers have seized on the changing business ecosystem over the last 18 months and found new ways to bypass cyber barriers at companies of all sizes.


Netflix cracks down on password sharing, improve security

When Netflix announced plans a few months ago to introduce new tests that are meant to target password sharing, many users were concerned that this may result in the end of account sharing. While Netflix has long had a ‘no password sharing’ policy, extremely high levels of password sharing exist between family and friends.


Using Public WiFi Safely

The spread of this easily accessible Wi-Fi has enabled people on the move to do everything from check their emails to watch videos online. But users should log into these services with caution as malicious actors regularly attempt to steal sensitive data through unsecured connections.


The fight against keylogging attacks

Keyloggers are designed to track successive keystrokes made on a keyboard and generally operate without the device user being aware.


Creating a security-first culture

hile technology clearly has a critical role to play in stopping attacks from being successful, providing employees with the know-how and understanding of the threats they face is vital.


Cloud cybersecurity in a hybrid working world

Gaining a complete view of what data is stored in the cloud, who is using it and where it is being accessed can be vital in uncovering the presence of malicious actors.


The art of manipulation: Protecting your business against attacks

Do you know how many people have access to your businesses core systems? Chances are it’s more than you think, and the bad news is that every one of them represents a potential entry point for cybercriminals.


2021 Playbook: Enforcing Zero Trust for All Identities

Adopting a Zero Trust mindset means organisations are able to ditch the outdated ‘trust but verify’ approach and instead embrace a ‘never trust, always verify’ security stance, and ensures organisations stay ahead of the security curve.