Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

3.5 million Omni Hotel guest details held to ransom by Daixin Team

3.5-million-Omni-Hotel-guest-details-held-to-ransom-by-Daixin-Team_Blog-Header

The international hotel chain Omni Hotels & Resorts has confirmed that a cyberattack last month saw it shut down its systems, with hackers stealing personal information about its customers.

In the aftermath of the attack, hotel guests reported that they had been forced to check in on paper, that room keys didn't work, and all phone systems and Wi-Fi were offline.

Continue reading
  2242 Hits

What makes a ransomware attack eight times as costly? Compromised backups

blog-header-what-makes-a-ransomware-attack-eight-times-as-costly

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

Continue reading
  51232 Hits

Ransomware: lessons all companies can learn from the British Library attack

Ransomware-lessons-all-companies-can-learn-from_Blog-Banne_20240322-175134_1

In October 2023, the British Library suffered "one of the worst cyber incidents in British history," as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world's greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

Continue reading
  76123 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

The-Key-to-Establishing-Ironclad-Remediation-and-Disaster-Recovery-Processes_Heade_20240322-102320_1

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

Continue reading
  349 Hits

What does the ICO’s new fining guidance mean for your organisation?

What-does-the-ICOs-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

Continue reading
  412 Hits

Cyber crime: ransomware attacks

Ransomware-banner

 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the fi...

Continue reading
  2704 Hits

Three steps to more secure employee passwords on World Password Day

Three-steps-to-more-secure-employee-passwords-on-World-Password-Day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

Continue reading
  1579 Hits

Creating new workspaces for the distributed workforce’s ‘liquid footprint’

Creating-new-workspaces-for-the-distributed-workforces-liquid-footprint

With the flexible office model slowly but surely supplanting the traditional working environments in favour of dynamic co-working spaces for a number of years now, we have seen many organisations reconsider the way they think about commercial real estate.

Continue reading
  1812 Hits

Keeping our schools cybersafe throughout lockdown

Keeping-our-schools-cybersafe-throughout-lockdown

The past year has challenged the UK's education sector in ways that would previously have been inconceivable, with children learning from home the majority of the time since March.

Continue reading
  2258 Hits

You cannot afford to risk human error compromising your cyber security

you-cannot-afford-to-risk-human-error-compromising-your-cyber-security

In spite of the ongoing evolution of cyber security processes and technology, human error is still responsible for 95% of data breaches1. Phishing attacks alone represent a particularly insidious risk, with 91% of organisations experiencing a successful attack in 2021 alone2.

Continue reading
  1286 Hits

Be prepared: optimising cyber security in an increased threat landscape

Achieving-airtight-cyber-security-in-an-increased-threat-landscape-blog-header

In light of recent geopolitical events, and the increased threat to corporate infrastructure, organisations across the UK must assume that they will be forced to contend with a cyber-attack in the near future and prepare accordingly. Indeed, the NCSC has already set out its own guidance to help organisations bolster their defences, which we strongly advise you to read and implement.

Continue reading
  1678 Hits

Cultivating a new breed of cyber security for the new shopping experience

Cultivating-a-new-breed-of-cyber-security-for-the-new-shopping-experience_2

Retailers - be they small local shops, online sellers, or top global brands - generate, transfer, and store more data than ever before, ranging from customer data (both online and in-store, as we have considered in previous articles), to supply chain and asset tracking data. Whether it's shopping online or utilising in-store apps to access the latest savings and special offers, the way customers shop has fundamentally changed forever, with the data they generate online and in person allowing retailers to build up unique personas that drive truly bespoke experiences.

Continue reading
  1552 Hits