Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Is your ISP keeping up with evolving DDoS threats?

Iain Westwood

How DDoS attacks have evolved

As with most IT security threats, distributed denial of service attacks have evolved over time.  Simple attacks at the network level designed to exhaust target bandwidth capacity have been complemented with more complex and subtle attacks that can bring down websites but leave the network standing, often without triggering DDoS mitigation.

more →

Blog

Join Us For The activereach Fantasy Premier League 19/20

After a great 18/19 season, our most successful to date, activereach will be hosting another custom Fantasy Premier League. It is completely free to take part and activereach will donate £250 to the charity of the winner’s choice at the end of the season.

If you already take part in the official Fantasy Premier League game then you know the drill.

more →

Blog

CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware

Sharon Holland

A recent article on Dark Reading by VP of Intelligence Adam Meyers at our partner Crowdstrike is titled “The Big E-Crime Pivot.” It puts forth the argument that cybercriminals “have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.”

For those that don’t have time to read the full article, we have collated some of the highlights:

What is the Pivot?

more →

Blog

What Should a Cyber Incident Playbook Include?

Alastair Horner

Do You Really Need A Cyber Incident Playbook?

As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different?  Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.

more →

Blog

Not What It SIEMs. How SMEs Can Unlock the Power of Logs Without a SOC

Max Pritchard

Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.

more →

Blog

Protecting Energy and Utility Companies from DDoS Attacks

Lorna Fimia

Protecting UK energy and utility companies from cyber and distributed denial of service (DDoS) attacks is a top priority for the government. Organizations responsible for critical national infrastructure have become a prime target for denial-of-service events; a DDoS attack is designed to overwhelm networks with bogus traffic and has the potential to cause massive utility outages and service disruption.

more →