News

Why you need to Pay Attention to the EU NIS Directive

Earlier this week the Minister for Communication Denis Naughten signed orders to protect essential services from cyberattack. The EU NIS Directive requires governments to designate so-called “operators of essential services” who will be required to put special security and reporting measures in place to guard against hacking and cyber attacks. This regulation is not to be confused […]

Find out more

Why you need to Pay Attention to the EU NIS Directive

Earlier this week the Minister for Communication Denis Naughten signed orders to protect essential services from cyberattack. The EU NIS Directive requires governments to designate so-called “operators of essential services” who will be required to put special security and reporting measures in place to guard against hacking and cyber attacks. This regulation is not to be confused […]

Find out more

Load More

When Should Organisations Appoint A DPO?

The enforcement of the EU General Data Protection Regulation has brought data protection to the front line of business agendas around the world. It requires change in how organisations keep, store and process information but it also changes how an organisation takes accountability for its data and how it proves compliance. Under the EU GDPR, […]

Find out more

Cybersecurity In The Financial Sector: Risks and Opportunities  

The threat and impact of cyberattacks is increasing in all industries, but criminals target financial firms because that’s where the money is. Slowly but surely, cybersecurity is becoming the forefront of all financial firms’ agendas with bank account fraud being one of the most common forms of financial cybercrime being reported.  The financial industry holds the […]

Find out more

How to Strategically Address Cyber Security Risks Facing Insurance Companies

Data breaches and cyber-attacks in the insurance industry are growing at an alarming rate as hackers grasp the value of data collected by insurance companies, yet many insurance organisations do not understand the risk they are exposed to. When you consider the information collected by insurance companies, the level of sensitivity and the value it […]

Find out more

Smarttech247 Winner Profile – MSSP of the Year

The Smarttech247 team were delighted to win this year’s Managed Security Service Provider title at the Tech Excellence Awards. Here is is an excerpt from our winner’s profile feature in the Tech Pro magazine this month: Tell us about Smarttech247  “Smarttech247 is a cyber security organisation that provides innovative solutions to global companies. The 3 […]

Find out more

Five Ways Hackers Are Stealing Passwords

Passwords

Someone once said passwords are like apples in a fictional garden. They are perfect, ripe and there for the taking! Twitter today announced that they had discovered a glitch in their systems that stored passwords in plain text (rather than being hashed), however, that no misuse or breach has been detected. But what would have […]

Find out more

Computer Vulnerabilities: How Safe Are Your Systems?

The first quarter of 2018 has recently just ended with a high number of critical vulnerabilities being discovered so far, from the early vibes of Spectre and Meltdown to Intel’s kernel leaking vulnerability up to the very recent Cisco smart install vulnerability.  Towards the end of last year, we discussed a few major attacks that […]

Find out more

The Anatomy of a Compromised Network (Part 2)

  In our last article, we began to examine the anatomy of a compromised network. We discussed what constitutes a compromised network and common ways by which network architectures get compromised. In this piece, we will be focusing mainly on how to identify a possible network compromise and discussing a few mitigation steps. Just like […]

Find out more

The Anatomy of a Compromised Network (Part 1)

A couple of years ago I had set up a honeypot to study the behaviour of botnets on smart systems. I was interested in how they become compromised and the speed at which different classes of remote commands are executed. One of the most interesting things that were observed was the seemingly normal behaviour several […]

Find out more

GDPR: EU regulators confirm the need for incident detection capability

The Article 29 Working Party has recently published updated guidance on the Personal Data Breach notification rules in Articles 33 and 34 of the General Data Protection Regulation (GDPR). The most important part of the update concerns the requirement for organisations to put in place incident detection technologies, which can ‘immediately’ detect whether a security incident has occurred. This obligation […]

Find out more