Next gen cyber security that’s revolutionary priced

One significant frustration for CIOs, CISOs and senior IT professionals charged with data and system security is that, while there are many solutions on the market that provide tools for monitoring and detecting threats, most are prohibitively expensive and often out of reach for small businesses with limited IT and information security budget. This results … Continue reading Next gen cyber security that’s revolutionary priced

Advertisements

Global Head of IT Arvato Financial Services

“We chose Invinsec over other market leading traditional SIEM solutions, because they were far more proactive in their approach to the managed detection and response challenge. Invinsec have thought outside the box and delivered a passionate service which speaks to their passion for Cyber Security. Invinsec is run and staffed by industry professionals with a … Continue reading Global Head of IT Arvato Financial Services

Think retail is safe from cyber attacks? Think again…

Cyber attacks in the retail and FMCG sector are not confined to ecommerce businesses such as with online payment fraud or distributor denial of service (DDoS) attacks. While these are a concern for many retailers selling online as well as in store, cyber attacks affect all merchants. That’s because it’s not just about stealing goods … Continue reading Think retail is safe from cyber attacks? Think again…

Things to consider when choosing a cyber security vendor

2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data breaches and cybercrime resulting in a steady stream of headlines; WannaCry, Bashware, Shadow Brokers, Petya, Cloudbleed, the list goes on… As we start to turn our attention to 2018, it’s time to think about how to … Continue reading Things to consider when choosing a cyber security vendor

The problem with your inherited legacy systems

We know, it’s not your fault. You joined a financial services firm and inherited processes, software and systems that were installed by your predecessor, if not before. Given the choice we know you would like a fresh start; but budgets, internal politics and potential disruption often make it difficult to upgrade and put alternative solutions … Continue reading The problem with your inherited legacy systems

Protect your brand and reputation with these 5 ways to minimise data breaches

Building your business’ reputation and brand image takes time - years even - and costs money. Investment in marketing, customer services and PR activities does not come cheap, yet it could all be written off with a single data breach. While many high profile enterprises appear to be able to ride out the storm of … Continue reading Protect your brand and reputation with these 5 ways to minimise data breaches

You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:

https://blog.checkpoint.com/2017/09/11/beware-bashware-new-method-malware-bypass-security-solutions/ It is picking up a lot of chatter amongst the security and IT community, and we suspect will soon be as widely spoken about as HeartBleed. Criminals are exploiting the fact that Windows 10 now lets you run a Linux Shell natively and are writing their malware to run within this Linux Shell in … Continue reading You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:

Recruitment agencies and their candidates are a key target for today’s cyber-criminals

For the recruitment industry, candidate data is what differentiates a successful recruitment agency or recruiter from those that fail to hit target. Recruitment agencies spend many years building up and nurturing their lists, and therefore they are valuable IP. Once upon a time this data existed in the filing cabinets that used to flank the … Continue reading Recruitment agencies and their candidates are a key target for today’s cyber-criminals

Getting back to basics – building a secure network architecture

Why is cyber security management so often reactive? Typically, it’s because security is bolted on to existing network systems and architecture when vulnerabilities are identified or a threat hits home. This often results in businesses deploying multiple prevention and detection solutions in an attempt to shore up different areas of the network architecture. This reactive … Continue reading Getting back to basics – building a secure network architecture

The biggest IT security threats are often inside your own company

Most business owners, CEOs and CIOs are concerned about an unseen army of cyber criminals and hackers poised to attack their business, hold their IT systems and data to ransom and cause untold damage to business operations, customer relationships and brand reputation. However, although this threat is very real, the biggest IT threat to your … Continue reading The biggest IT security threats are often inside your own company