Microsoft Security Stack – will there still be room for specialists?

As the functionality and capability of the Microsoft security suite continues to grow, and the results of comparative testing from industry experts get more impressive with each passing month, where is this all going – and what will the specialist security market look like in 5 years? Here at ITC we have been very impressed […]

COVID-19 RELATED CYBER ATTACKS

Executive Summary: Since January, ITC’s Security Operations Centre (SOC) has been monitoring threat actors against the healthcare sector and their attempts to take advantage of COVID-19. The attacks were initially rudimentary. Victims were targeted with phishing emails pretending to be from the World Health Organisation. However, during the past couple of months these attacks, which […]

4 practical tips to protect your staff remotely

Here are 4 practical things that you can do to protect your staff as they work from home, by leveraging your existing Microsoft enterprise agreements: 1. Endpoint device security.  Employees may be working from home for some time and their endpoint devices will require securing, updating and monitoring on a continuous basis; without having physical […]

ITC Secure and CyberFirst

This is the third year that ITC Secure will support the National Cyber Security Centre’s CyberFirst programme. CyberFirst aims to develop the UK’s next generation of cyber professionals through student bursaries, courses for 11-17 year olds and competitions. Every year, I am privileged to meet amazing students with a passion for cyber security and often […]

Top 5 security tips for remote working

As COVID-19 continues to spread, businesses are conducting the largest work from home experiment ever seen. Whilst working from home is usually associated with freedom and flexibility, it is in fact a time when a little more thought is necessary; employees need to understand that the cyber risks they face are increased simply because they […]

Time for a fresh look at the Microsoft security stack?

A decade ago, in fact 3 years ago, the words “Microsoft” and “Security” were rarely used in proximity to each other unless accompanied by swearing, hand gestures and a kind of grim hopelessness. Along with everyone else outside of Redmond, I held the view, and carried the supporting mental scars, that Windows was a huge […]

My train of thought crime

I have just moved home, out of London for the first time in years. I am on my first journey back – an hour and forty on what is, technically, the fastest train in the UK. Wait, that is actually the Eurostar but it’s not able to go at full speed on our rail infrastructure […]

To the fullest extent possible

Last month my car was stolen and I have, out of necessity, been talking far too much to my insurance company, its agents, a recovery company, the Met, an unidentifiable intermediary of some kind and now a repair yard. Each has sent me numerous communications – some by post, some by email, one by Dropbox […]

Cyber Incident Response – Boardroom Planning is Key

Reacting immediately to a cyber event could save your reputation. Data breaches, resulting in exposed credentials and damage to brand and reputation, continue to make headline news. As a result, cyber incident response is gaining more high-profile attention in the media and, crucially, in boardrooms across all industries. But, according to the UK Government’s 2020 […]

NCSC: Supply chain security guidance

Proposing a series of 12 principles, designed to help you establish effective control and oversight of your supply chain. Introduction The guidance will provide organisations with an improved awareness of supply chain security, as well as helping to raise the baseline level of competence in this regard, through the continued adoption of good practice. Whilst […]