Blog

Why Financial Services needs Endpoint Detection and Response (EDR)

Sharon Holland

Financial Services Still A Prime Target

Despite spending many millions of pounds on security, financial services organizations continue to be one of the top targets for cybercriminals, with cyber-incident reports from the UK finance sector increasing by 1,000% in 2018.  The access to the vast amounts of money that the financial industry trades and controls, along with the sensitive personal information they store, continues to make them a prime target.

more →

Blog

Cyber Security Threats in a Digitally Transformed World

John Clark

The trend for digital systems replacing older technology is far from new. In the past, when newspapers moved from a traditional, labour intensive approach where typesetters had a job for life, to computer aided production, we probably would have termed it “replacing with new technology”. However, the rate at which the current wave of “digital transformation”, as we now term it, is sweeping through many industries is hugely significant, both in its effect on those companies involved and in the way it exposes them to threats and vulnerabilities in today’s Internet connected world.

more →

Blog

NCSC Guidance On Preparing For A Denial Of Service Attack

Alastair Horner

Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.

The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.

more →

Blog

DoH!

Iain Westwood

DoH, or DNS over HTTPS to be precise, has featured in mainstream media in recent weeks. Both Mozilla and Google have confirmed that their Firefox and Chrome browsers will be implementing DoH by default but what exactly is it and why does it have ISP’s worried?

To recap, DNS (or the Domain Name System) is used to translate a human-readable host address such as www.activereach.net to its underlying IP address that your computer can connect to in order to receive content.  

more →

Blog

Why Enterprises Should Consider Moving To Open Source Networking

John Clark

The traditional way of designing and procuring hyper-scale networks has been seen almost as an outmoded concept since the advent of Software Defined Networking (SDN) and Network Function Virtualisation (NFV) but the key part of this wave, the use of open source operating systems for network switches and routers, is allowing a real “sea-change” in the industry.

more →

Blog

Make your Endpoint Protection work smarter not harder with SOAR

Oliver Sears

When we hear the term ‘Endpoint Security’ we often think of making sure your organization is protected from malicious actors and cyberattacks attacking via an endpoint. This involves making sure that all the access points into an organization’s critical systems and physical devices are protected from unauthorized access to prevent damage to the rest of the network.

more →