Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Why COVID-19 is providing the perfect opportunity to test your defenses

Sharon Holland

We have always advocated DDoS testing your systems on a regular basis on the premise that it is no good waiting until you experience a DDoS attack to find out that the mitigation that you so diligently put in place doesn’t provide the protection you need.  But we know that many companies struggle to find the time to be able to run such tests.

more →

Blog

Is your ISP keeping up with evolving DDoS threats?

Iain Westwood

How DDoS attacks have evolved

As with most IT security threats, distributed denial of service attacks have evolved over time.  Simple attacks at the network level designed to exhaust target bandwidth capacity have been complemented with more complex and subtle attacks that can bring down websites but leave the network standing, often without triggering DDoS mitigation.

more →

Blog

Stay happy and healthy when working from home

Sharon Holland

With the recent move to home working for a lot of people, even for a short time, its important to approach this in a structured way to keep you both happy and healthy.  Below is our survival guide to working from home:

Create a designated work area

One of the best ways to reinforce the work/home boundary is to set up a dedicated office area – it doesn’t need to be a separate room it can just be a designated corner of a room. 

more →

Blog

Remote Working and Keeping Safe

Iain Westwood

Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.

Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever. 

more →

Blog

XSS, SQL injection, and WAF

John Baldock

XSS – Cross-site scripting

XSS is a common form of injection attack on public facing web servers. Any web server can be vulnerable to attack, and websites now are feature-rich with multiple embedded databases, comments sections, and media… all of which increase the vector types that can be attempted by cyber criminals for various reasons.

more →

Blog

activereach and eSentire Lunch and Learn Event: A Fresh Eye on Cybersecurity 2020

This month we are sharing a blog from our partner eSentire who co-hosted our recent ‘A Fresh Eye on Cybersecurity 2020’ event.

On February 27, eSentire co-hosted a London lunch and learn event, “A Fresh Eye on Cybersecurity 2020” with our partner activereach. Approximately 30 IT decision-makers from businesses of various sizes and industry segments joined us for an in-depth discussion on evolving technologies and the cybersecurity landscape.

more →

Blog

Cybersecurity for small businesses

Iain Westwood

The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press.  These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds.  But what about the little guy?

Email attacks

Small businesses can often be the focus of specific targeted email-based attacks.  

more →