Latest posts

UK-NL Cyber Security Showcase 2017

28 / 09 / 2017

We have just returned from the very successful UK-NL Cyber Security Showcase 2017 which we were proud sponsors of. The event brought together 45 of...

The Hague’s leading security hub welcomes UK cyber security firm CyNation

28 / 09 / 2017

The Hague, 27 September 2017 – The UK Compliance & Information Security company CyNation has opened a new office in The Hague. CyNation helps or...

Your Cyber Risk isn’t your own anymore!

22 / 09 / 2017

Data security and privacy are the foundations of today’s world. A world where the boundaries between business processes, people and technology are g...

Our Security Summary for the month of August

22 / 09 / 2017

We are starting a new monthly series where we summarise what we believe to be the top security news of the month. Be that big data breaches or new att...

Spam bot found to contain millions of email accounts

22 / 09 / 2017

Spam bots are a major cyber crime enabler for criminals. It allows criminals to spread malware and phishing emails, which are both considerable issues...

Phishing scams rise as scammers use the devastation of Hurricane Harvey for their own personal gain

22 / 09 / 2017

Two ideas often used by phishers are a fake subscription invoice or a fake sob story. They use this technique to get an instant reaction from the read...

UK seeks data transfer pact with EU after Brexit

22 / 09 / 2017

The UK is seeking a data transfer pact with the EU, Dr Karen Mc Cullagh, a legal expert at the University of East Anglia said “It will help busine...

Potential “Locky” ransomware resurgence – what you need to know

22 / 09 / 2017

What is Locky? Locky is a form of ransomware which first appeared back in 2016. Locky originally was delivered by email, usually looking like an in...

The malicious insider, a threat hiding in the shadows of the high profile cyber attacks

22 / 09 / 2017

The threat posed by a malicious insider to organisations is not receiving the attention that it arguably deserves as the security world’s attention ...

Page