Cyber Security - 33 articles

April 17, 2025
Lewis Stewart of Forfusion takes a look at IT Security and understanding the Human Firewall “The human element is the most common vector for an attacker, an educated or trained end-user is an asset to any organisation when he or she takes proactive steps to alert security personnel.” (Hummel.R, 2017) Whether it be your employees, contractors, ... Read more
April 17, 2025
Hi David, firstly could you tell us a little about the team at CyberAggress and the unique skills and experiences you each possess?A: The company is built upon the skills of myself and Gillian. Gillian has an extensive background in the pharmaceutical industry overseeing drug trials. The pharma industry is highly regulated and data protection/anonymity ... Read more
April 17, 2025
Large cyber-attacks are in the news all the time, with cyber criminals worryingly targeting banks, the NHS, large businesses and recently the emails of Government ministers. It’s easy to understand the value of the information these criminals might be able to extract from attacking such high profile targets, and as a result we perhaps come ... Read more
April 17, 2025
The series of infographics Company Connecting have put together recently has developed an overview of Scotland’s progress in some of the biggest IT and tech industries. This week the CC blog features an infographic looking at Scottish Financial Technology, or FinTech. The infographic is based entirely on Company Connecting data, the authoritative source of information ... Read more
April 17, 2025
We have taken a look at the IT companies that fall within the City of Edinburgh council area. We have identified 560 that fall within the area. The top three sectors are IT, Finance and Retail. This reflects the need that IT companies also have of skills to support their business. Edinburgh is known for ... Read more
April 17, 2025
Mark Chimley, an Information Assurance Architect and Cyber Security Consultant asks “What are reasonable mobile computing security procedures?” Working on the MoveI am writing this on a train using mobile computing devices (a netbook and a phone) and I’m fairly happy with the security measures I’ve put in place and the procedures I’m using to enable mobile ... Read more
April 17, 2025
It seemed apt to write my first post here on a topic which is becoming increasingly important for businesses: the risk of ransomware. RansomwareJust as a perpetrator may hold a physical person or thing to ransom, the same applies to a company’s data assets and information. Documents, images and other files are encrypted by ransomware ... Read more
April 17, 2025
Cybersecurity and, more broadly, issues connected with cyberspace, have risen to the rank of strategic, global challenges. On the one hand, over the last few decades we have witnessed unprecedented opportunities for general development: economic, political, social, and individual. On the other, we are now facing completely new categories of threats, with potentially catastrophic consequences. ... Read more
April 17, 2025
Cryptography has a saint and sinner profile just now, with companies like Google pushing forward HTTPs, and governments around the world railing against it. While many countries have been close to forcing companies to add backdoors, few have taken the step of ban its operation. Now, a royal edict from the president of the United ... Read more
April 17, 2025
Secure tunnels and VPN connections have had a difficult time recently, as law enforcement has railed against their implement. Also with the increase in data loss, too, typically through an insider or from a remote access trojan (RAT), many companies are looking to ban VPN connections, and also to replace the digital certificate from the ... Read more