Mad as a Black Hatter

The expression ‘mad as a hatter’ is apparently an old English colloquial saying, which predates Lewis Carroll’s brilliant character. Amongst many theories for the origins is the fact that hardworking milliners in times of yore were often poisoned by mercury used in the process. Lovely. We all know that it doesn’t take mercury to drive […]

Five recommendations from the NCSC

At the CBI conference in September 2018 the CEO of GCHQ’s National Cyber Security Centre (NCSC), Ciaran Martin, delivered The Board Guidance Tool Kit. Here is a summary of his five recommendations, together with some suggested security approaches and/or remediation tactics. “Control the use of your privileged IT accounts” Ciaran Martin – CEO at NCSC […]

Cyber security – what to look out for in 2019

Acknowledging that criminal activity is becoming more sophisticated, in this article our experts highlight five areas of immediate concern and warn that businesses must be prepared or risk devastation. In recent years the cyber security challenge from hostile states and increasingly-well-organised criminals has contributed to a sense of uncertainty in society. Governments have not yet […]

Pandora’s Box

At the ITC Cyber Summit this year, which was well attended and according to feedback “interesting”, we made some predictions for the coming year. Amongst them was this: Containerisation, Cloud and Agile, what could possibly go wrong?  There is a furious rush to migrate to cloud based containerised services and develop applications at breakneck speed […]

Cryo Currency

The news this week was alive with a story about the Canadian crypto-currency exchange QuadrigaCX , who’s CEO is unfortunately not (alive). Gerald Cotten, the aforementioned CEO is reported to have died in on the 9th December in Jaipur India, of complications from Crohn’s disease whilst apparently opening an orphanage. As well as being a shocking […]

REVERSE RDP ATTACKS

Priority: High Executive Summary: Researchers at Check Point have uncovered a number of vulnerabilities in three Remote Desktop Protocol (RDP) Clients: Microsoft’s RDP client, rdesktop, and FreeRDP, which can be exploited by a malicious server when the client connects to it over RDP. This would allow an attacker who had compromised a user’s device to […]

ZuckBook

Firstly, we would like to thank all of you who took time out of your busy days to attend our Cyber Summit yesterday in London. We heard from the venerable Paddy McGuinness CMG OBE (some say that it stands for Call Me God), who recommended that this is a year for self-reliance and being in […]