Security

IXCG at Security and Counter Terror Expo 2018

IXCG will be exhibiting at Security and Counter Terror Expo 2018, the UK’s leading event for national security professionals. The expo runs from 6-7th March 2018 and will see over 9,000 visitors from over 110 countries learning about the latest in threats and products, services and systems which can mitigate them. IXCG will be showing the latest in cyber security systems from a number of our partners and explaining how they work together to provide a complete “defence in depth”…

Read More

Disposal of electronic waste – The practicalities and the law

You may not realise it, but when electronic equipment comes to the end of it’s life, there are local laws which govern how it must be disposed of. Modern electronics contain a mix of elements, many of which are environmentally damaging which means that, should they disposed of in normal waste, can pose a severe pollution risk. In Europe this disposal is covered by the Waste of electrical and electronic equipment (WEEE) directive. In addition to the environmental impact, many pieces…

Read More

How to avoid cyber-security incidents

IXCG deals with a large number of malware, virus and cybersecurity incidents every year and, in 90% of cases, a lack of basic planning means that a minor outbreak becomes a major, and very expensive, incident. With prevention costing roughly 5-10% of the cost of an incident, why are so many businesses getting it so wrong? The most common factors with incidents are that the affected organisations either believed that they wouldn’t be a target, or that someone else in…

Read More

The unsavoury side of USB storage

The unsavoury side of USB storage USB storage, (such as thumb drives, hard drives and mobile device integrated storage) is incredibly common in most workplaces. It’s cheap, convenient and provides a way of transferring or backing up large amounts of data easily. And, unfortunately, it is these attributes which make it a huge risk. A hacker’s friend Due to it’s ease of use and popularity, USB storage devices have become the favoured method of attack for many hackers and criminal…

Read More

Is antivirus all you need?

Many companies take they view that as long as they have an antivirus package installed on their computers, they’ll be fully protected from cyber attacks. After all, many antivirus packages offer a wide range types of protection, and are sold as a “one stop” solution, but is that the case? Very often not. What is the point of antivirus products? Computer viruses first appeared in the 1980s and were quite simple. Initially, written as a way of demonstrating the author’s…

Read More

Firewalls explained – A guide for non technical people

You may have heard the term “firewall” before and know that it is something to do with IT security, but what exactly are they and how do they work? With IT security now the responsibility of business owners, partners, directors or charity trustees, it is now important that these people understand what types of firewall exist and how they help protect client data. At it’s most basic, a firewall is a type of filter which ensures that data following between…

Read More

Why small and medium businesses are hackers’ favoured targets

Why small and medium businesses are hackers’ favoured targets According to Watchguard Technologies (a leading Internet security vendor), a staggering 80% of small and medium businesses believe that they’re too small to be of interest to hackers. However, their research shows that it is exactly these companies which are hackers’ favourite targets. But why? A false sense of security leads to an easy target As many small businesses don’t think of themselves as a target, they don’t bother to take…

Read More

Inventory management – Knowing what you have is fundamental to security

When we talk to IT managers, security professionals and directors, one of the first questions we ask is “How many systems do you have to secure?”. It’s a simple question, but one which rarely has a simple answer. The typical reply tends to start with the word “About” and therein lies the problem; you can’t effectively manage and secure what you don’t know you have! Depending on the industry your organisation works in, you will typically be covered by several items…

Read More
Latest Tweets
Trend Micro Incorporated, a global leader in cybersecurity solutions, has been named a market leader in endpoint se… https://t.co/DlMBmBKZxX3 days
Is your business considering cyber-insurance? https://t.co/uPw5bGw6wh3 days
As bad actors seek ever-more lucrative ways to enhance their Distributed Denial of Service (DDoS) attacks, analysts… https://t.co/6RW1jwSDmK3 days
Climate change is real. Learn more about feeding the planet as the climate changes with rapid analytics on IBM Clou… https://t.co/B8TE3MlNUc5 days
IBM has committed to a hybrid cloud strategy & built an (IaaS) platform that can offer the versatility of public cl… https://t.co/GqJAN2RIgS5 days