Commissum

Opinion & Blog


Please click on the pink buttons to filter your results by blog or opinion.
Blog Opinion


Shut the Backdoor! You’re Letting the Hackers Breeze in…



Shut the Backdoor! You’re Letting the Hackers Breeze in…

News broke back in March 2016 that several major law firms in the US had been breached by hackers. This may have slipped somewhat under the radar, as just a few days later came the announcement of the Mossack Fonseca leak (it was also a breach), but … |More

Supporting Growth in Cybersecurity Skills



Supporting Growth in Cybersecurity Skills

Cybersecurity is one of the most exciting and progressive careers out there. Computing and STEM graduates currently have their pick of cybersecurity career paths as the number of opportunities seems to greatly outstrip the number of candidates.

With the average salary for cybersecurity jobs on the up … |More

Thoughts on Threats #1 – Malware Mayhem



Thoughts on Threats #1 – Malware Mayhem


Cyber threats come in many shapes and sizes, and can strike at any time. The widespread adoption and use of the Internet has led to an increase in the threats posed to organisations and individuals alike, and the opportunities available to those looking to attack.

On … |More

Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!



Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!


Keeping information secure can feel more like a never-ending marathon than a short sprint. 2016’s summer of sport is already in full swing, with the Euros and Wimbledon seeming to have flown by and the Rio 2016 Olympics now upon us.

Such high-profile events provide an … |More

Here Comes the Summer – and with it, a Whole Raft of Security Threats



Here Comes the Summer – and with it, a Whole Raft of Security Threats

Summer, it seems, has finally arrived in Scotland (well, barring the odd thunderous shower) and with it comes the promise of peace, of beers on the beach, and switching off for a glorious couple of hours or weeks without a care in the world.

Before you … |More

Failure to Prepare for a Data Breach is Preparing to Fail



Failure to Prepare for a Data Breach is Preparing to Fail


It’s often best to head into any venture with a “plan for the worst, hope for the best” mentality, and that mantra can be applied to information security as well. No-one expects a data breach to happen at their company, but new research from the Ponemon … |More

What Does Brexit Mean For Your Cybersecurity?



What Does Brexit Mean For Your Cybersecurity?


As a member of the European Union, the United Kingdom comes under various pieces of regulation designed to standardise and strengthen information security across the European market. Given that the UK has elected by referendum to leave the EU, where does this leave us in terms … |More

Mossack Fonseca – History’s Biggest Data Breach?



Mossack Fonseca – History’s Biggest Data Breach?


On Sunday 10th April the ICIJ (International Consortium of Investigative Journalists) in joint action with over 190 of its partners began publishing details of the 11 million leaked documents of the world’s 4th biggest offshore law firm, Panama’s Mossack Fonseca. The scale of the leak … |More

The Draft Communications Data Bill – The Latest News



The Draft Communications Data Bill – The Latest News


The Draft Communications Data Bill, also known as the Snoopers’ Charter, was originally developed in response to Edward Snowden’s disclosers of mass surveillance. Web surveillance legislation aims to allow for wider police powers to hack phones as well as view Internet browsing history. The revised bill … |More

Ransomware – Practical Tips in a Straightforward Manner



Ransomware – Practical Tips in a Straightforward Manner



No doubt the evolution of ransomware remains to be a hot topic among businesses and the security community in 2016. Cybercrime ecosystems remain in place, providing easy access to tools and exploit kits to carry out crime – so here we are, trying to tackle the … |More