tumblr visitor
Tag: Information Security

Fraud & Security – Social Engineering Awareness Workshop via @Jenny_Radcliffe

Social engineering is becoming increasingly common as a means by which fraudsters gain access to companies’ and organisations’ data and systems. Employees are tricked by fraudsters into breaching security protocols or giving away information – exploiting people as the weakest

Posted in Uncategorized Tagged with: ,

Travel/Info Security: Who Needs Social Engineering…..Don’t Forget Your Laptop!

It never ceases to amaze me the amount of information that travellers on trains share with their fellow passengers. Five passengers within touching distance (sounds a bit pervy) were using laptops for business (two of which worked for large UK

Posted in Information Security, Travel Security Tagged with: , ,

Infographic of the week: Why Ignoring Information Security is Lethal

Originally posted on London Love Business on 21/11/12

Posted in Information Security Tagged with: , ,

Are Multi Functional Devices (MFD’s) a Security Risk?

Has this advanced technology lead to even more security risks? I was recently asked about how to dispose of one of these devices and subesequently found  (with a little help from my friends) that it contained a 40gb hard disk drive

Posted in Fraud, Information Security Tagged with: ,

Press Release: (ISC)2® Foundation to Offer US$145,000 for 2013 Information Security Scholarships

Grant opportunities available to women, undergraduate, graduate and post-graduate students and faculty worldwide; candidates must apply by March 31st   London, U.K., November 20, 2012 —  Students and academics pursuing education in information security can begin their applications for 2013

Posted in Information Security Tagged with: ,

Press Release: New (ISC)2® Young Professionals Programme Offers Pathway into Cyber Security Field

Education and mentoring effort will give a leg up to young people who aspire to succeed as information security specialists—and help bridge a major skills shortage. London, U.K., 06 September, 2012 – (ISC)2® (“ISC-squared”), the world’s largest information security professional

Posted in Information Security, Press Release Tagged with: , ,

Information Security: How cybercriminals and hacktivists use DDoS tools to attack

Remote access, shell booters, low-orbit ion cannons – read all about it here Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault onTwitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services

Posted in Information Security Tagged with: , ,

Information Security: Q – When is bad security good? A – When you catch a pervert!

A 46-YEAR-OLD man’s secret computer stash of child pornography was discovered after he asked a workmate to record a television programme, a court has heard. Nicholas Hill, of Belvoir Crescent, Newhall, handed a memory stick to his colleague, who made the

Posted in Information Security Tagged with: ,

Information Security : Digital Forensics Proactive Or Reactive?

For a number of years digital forensics has referred to ‘the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law’. While collecting this digital evidence, to be used retrospectively in subsequent

Posted in Information Security Tagged with: ,

Information Security: Public ‘left in dark’ about cyber security failures

Many cyber security failures are still not detected – and even when they are, most are not reported to authorities or made known to the public, according to a study by the European Network and Information Security Agency. When large

Posted in Information Security Tagged with: ,