4 practical tips to protect your staff remotely

Here are 4 practical things that you can do to protect your staff as they work from home, by leveraging your existing Microsoft enterprise agreements: 1. Endpoint device security.  Employees may be working from home for some time and their endpoint devices will require securing, updating and monitoring on a continuous basis; without having physical […]

WINDOWS REMOTE CODE EXECUTION VULNERABILITY

Priority: High Executive Summary: Microsoft have revealed details of two vulnerabilities in the Adobe Type Manager Library which are being actively exploited in the wild [1]. The vulnerabilities, which Microsoft have said are being exploited in a “limited” capacity, allow for remote code execution. However, supported versions of Windows 10 with AppContainer setup will contain […]

ITC Secure and CyberFirst

This is the third year that ITC Secure will support the National Cyber Security Centre’s CyberFirst programme. CyberFirst aims to develop the UK’s next generation of cyber professionals through student bursaries, courses for 11-17 year olds and competitions. Every year, I am privileged to meet amazing students with a passion for cyber security and often […]

SO, YOU’VE BEEN ATTACKED BY RANSOMWARE. WHAT NEXT?

Article by Robert Scammell – Verdict Ransomware is lucrative for cybercriminals but crippling for businesses. And all the while it continues to be profitable, targeted ransomware attacks are likely to continue to grow in number. You’re sat tapping away at your computer when the machine becomes unresponsive. A message glares from your screen: ‘Oops! All of […]

INTEL GRAPHICS DRIVER VULNERABILITIES AND LOAD VALUE INJECTION

Priority: High Executive Summary: Intel have released an advisory detailing 17 vulnerabilities in their Windows graphics drivers [1]. These would allow an attacker to perform privilege escalation, perform a denial of service (DoS) attack and/or enable information disclosure. These vulnerabilities exist due to various issues in the graphics drivers, including buffer overflow flaws and improper […]

Top 5 security tips for remote working

As COVID-19 continues to spread, businesses are conducting the largest work from home experiment ever seen. Whilst working from home is usually associated with freedom and flexibility, it is in fact a time when a little more thought is necessary; employees need to understand that the cyber risks they face are increased simply because they […]

ITC THREAT HORIZON: CYBER RESILIENCE

[vc_row][vc_column][vc_column_text css=”.vc_custom_1583406373992{margin-bottom: 0px !important;}”]The highly infectious coronavirus (COVID-19) continues to spread globally and is causing disruption to many businesses and their security operations. Whilst many things are still unknown about the disease, it is of particular concern because of how contagious the virus is. Over the past weeks we have been working around the clock […]