An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

The Human Aspect of Staying Cyber Secure – And Why It Matters

Staying Cyber Secure

When evaluating cybersecurity risk, we tend to focus on technological factors: patches and upgrades, vulnerabilities, attack vectors, and so forth. Yes – technology solutions are vulnerable, and cybersecurity breaches are usually facilitated by advanced hacking technology.

However, the perpetrators behind cyber-attacks are human. These human actors have human motivations: greed, or a political agenda. Furthermore, cyberattacks often rely on human weaknesses – socially engineered cyberattacks, for example.

Continue reading
  2107 Hits
2107 Hits

How Cyber Criminals Are Using Social Media To Attack Companies

How Cyber Criminals Are Using Social Media To Attack Companies

Social media is the new black and everybody wants to be part of it. Posting one’s activities, sharing one’s thoughts, and reacting to other people’s posts have simply become part of our daily lives.

But to those who know what they’re looking for, this social media content can lead to a goldmine of information. It is through this goldmine—terabytes upon terabytes of data, that cyber criminals flourish, using such data to attack individuals and even companies.

How exactly can cyber criminals use social media to compromise online security and attack business organisations? Let’s discuss their methods.

Continue reading
  2427 Hits
2427 Hits

5 Ways to Protect Your IoT Devices

5 Ways to Protect Your IoT Devices

The internet of things (IoT) is undoubtedly growing rapidly. According to Gartner the typical CIO will be looking after triple the number of IoT devices in 2023, compared to the number of IoT devices under their security remit in 2018.

This influx is caused by a mix of repurposed consumer devices, IoT devices that support infrastructure and business-specific IoT devices. Dodging the explosion of IoT devices is impossible, and yes, IoT does deliver a lot of advantages – but the security implications can be serious.

Continue reading
  15096 Hits
15096 Hits
Top