News

GDPR: EU regulators confirm the need for incident detection capability

The Article 29 Working Party has recently published updated guidance on the Personal Data Breach notification rules in Articles 33 and 34 of the General Data Protection Regulation (GDPR). The most important part of the update concerns the requirement for organisations to put in place incident detection technologies, which can ‘immediately’ detect whether a security incident has occurred. This obligation […]

Find out more

GDPR: EU regulators confirm the need for incident detection capability

The Article 29 Working Party has recently published updated guidance on the Personal Data Breach notification rules in Articles 33 and 34 of the General Data Protection Regulation (GDPR). The most important part of the update concerns the requirement for organisations to put in place incident detection technologies, which can ‘immediately’ detect whether a security incident has occurred. This obligation […]

Find out more

Load More

PoS Malware: How does it affect you?

2018 was welcomed in with quite a power variant of the point of sale (PoS) malware.  In January, security researchers discovered the UDPoS which disguises itself as an update for LogMeIn remote access software. As soon as a PoS terminal is infected with this particular malware, the malware creates a new system service to maintain […]

Find out more

Six Steps to an Effective Security Response Strategy

Cyber Security Incident Response Smarttech247

  “File A  now reads as xysjdsndhd.exe!  File B converting to hsdssdjsdjs.pdf Mary cannot get any file to open on her system! Is she the only one? John’s PC in accounting is experiencing the same issues! Lucy in HR also!!  Oh great! We have just been hit with Ransomware!” Cyber incidents have been on an […]

Find out more

Connected Future: Security Threats of Popular Technologies

The last seven years have witnessed an exponential growth in the development of computer technologies and the ease of life that comes as a result of them. About thirty years ago, the idea of having a fridge that orders groceries by itself once they run out or having a car that optimises its own operation […]

Find out more

Central Processor Unit (CPU) Architectural Design Flaws

Overview Google announced three major vulnerabilities that can be exploited in today’s central processing units (CPUs). Major processor vendors, operating system vendors, and application vendors were pre-notified so that they would be able to address this critical issue. Most modern CPU’s are affected. Description This collection is based on a number of articles, including those […]

Find out more

From EU GDPR to AI – Cyber Security Predictions For 2018

With 2018 approaching fast on the horizon, the cybersecurity community questions whether or not the lessons taught in 2017 will have fallen upon deaf ears.  2017 marks one of the biggest years in history for high-profile data breaches, and 2018 will be no different. As cyber-criminals become more skilled in their work and their technologies […]

Find out more

Cyber Attacks That Shook 2017

The year 2017 will go down in history as one of the most interesting years so far by having experienced a disproportionally large number of cyber attacks. From large corporate breaches to state sponsored cyber attacks, 2017 has to be one of the years with the greatest cyber meltdown ever recorded in history. In this […]

Find out more

Cybersecurity Monitoring for SCADA

At Smarttech247 we are scailing up our portfolio of managed security services to include monitoring of industrial systems, (ICS SCADA, OT). Modern control systems are increasingly complex, digital and connected. Where in the past these were isolated from other networks, today’s operators typically require data to be transferred between industrial and external networks. This has […]

Find out more

The Achilles Heel of Cybersecurity

The Equifax breach once again highlights how Application Vulnerabilities remain the achilles heel for organisations. Hackers exploited a two-month-old flaw in Equifax’s web systems to steal 143 million customer’s private data. Analysis of the major breaches from 2012  will show that Application-level vulnerabilities have caused far more data breaches in recent years than any other […]

Find out more

Practical Steps To Cyber Security For Law Firms

With the proliferation of cyber attacks in 2016 and 2017, it is imperative for organisations to keep systems and data safe, and no industry is exempt from this rule. Law firms are the same as any other company when it comes to countering cyber attacks and protecting their most important data. All organisations must have a security […]

Find out more