Commissum

Blog


Festive Security Tips to Tackle a Sleigh Full of Business Risk



Festive Security Tips to Tackle a Sleigh Full of Business Risk

It’s that time of year again – snow stubbornly refuses to fall on the rooftops as offices wind down and prepare for their respective office parties (ours was a blast – photos on our Twitter and LinkedIn!) Everyone has a lot on their plate during the … |More

The Investigatory Powers Bill Has Been Granted Royal Assent and is Now UK Law



The Investigatory Powers Bill Has Been Granted Royal Assent and is Now UK Law

We haven’t heard much lately about the Investigatory Powers Bill – dubbed the “Snooper’s Charter” by its opponents – and to be fair there’s been quite a lot on. We’ve had Brexit and its fallout, the Rio Olympics, Internet of Things botnets running wild, and now President-elect … |More

Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight



Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight


Back in August, we kicked off the Thoughts on Threats series with a look at the top-rated threat in ENISA’s Threat Landscape study from 2015. In this installment, we’re heading down the list to the number two spot for a closer look at one of the web’s … |More

Shut the Backdoor! You’re Letting the Hackers Breeze in…



Shut the Backdoor! You’re Letting the Hackers Breeze in…

News broke back in March 2016 that several major law firms in the US had been breached by hackers. This may have slipped somewhat under the radar, as just a few days later came the announcement of the Mossack Fonseca leak (it was also a breach), but … |More

Supporting Growth in Cybersecurity Skills



Supporting Growth in Cybersecurity Skills

Cybersecurity is one of the most exciting and progressive careers out there. Computing and STEM graduates currently have their pick of cybersecurity career paths as the number of opportunities seems to greatly outstrip the number of candidates.

With the average salary for cybersecurity jobs on the up … |More

Thoughts on Threats #1 – Malware Mayhem



Thoughts on Threats #1 – Malware Mayhem


Cyber threats come in many shapes and sizes, and can strike at any time. The widespread adoption and use of the Internet has led to an increase in the threats posed to organisations and individuals alike, and the opportunities available to those looking to attack.

On … |More

Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!



Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!


Keeping information secure can feel more like a never-ending marathon than a short sprint. 2016’s summer of sport is already in full swing, with the Euros and Wimbledon seeming to have flown by and the Rio 2016 Olympics now upon us.

Such high-profile events provide an … |More

Here Comes the Summer – and with it, a Whole Raft of Security Threats



Here Comes the Summer – and with it, a Whole Raft of Security Threats

Summer, it seems, has finally arrived in Scotland (well, barring the odd thunderous shower) and with it comes the promise of peace, of beers on the beach, and switching off for a glorious couple of hours or weeks without a care in the world.

Before you … |More

Failure to Prepare for a Data Breach is Preparing to Fail



Failure to Prepare for a Data Breach is Preparing to Fail


It’s often best to head into any venture with a “plan for the worst, hope for the best” mentality, and that mantra can be applied to information security as well. No-one expects a data breach to happen at their company, but new research from the Ponemon … |More

What Does Brexit Mean For Your Cybersecurity?



What Does Brexit Mean For Your Cybersecurity?


As a member of the European Union, the United Kingdom comes under various pieces of regulation designed to standardise and strengthen information security across the European market. Given that the UK has elected by referendum to leave the EU, where does this leave us in terms … |More