Security

Free dedicated WIPS sensor when you purchase qualifying Mojo Networks products

  Wireless Intrusion Prevention System, known as WIPS, is a system which identifies threats to your wireless network and takes active steps to mitigate them. It’s a highly recommended technology but one which is not commonly deployed by many organisations, despite it being the most effective way of preventing intrusions into wireless networks and regular airspace assessments being a regulatory requirement in some industries (such as retail and hospitality). To make deploying WIPS, and protecting your customers’ data, more affordable…

Read More

Staff security training – A key part of cyber defence

One aspect of cyber security we see at IXCG more than any other is the fact that an organisation’s staff are often far better at getting around any security systems which have been put in place than any hacker. There are many reasons for this; staff work around the security systems daily, badly thought out systems can impact their ability to work so they seek out ways to lessen this impact and that many staff don’t give security a second…

Read More

How a label can save your organisation millions

As you read this article, as yourself a question; how do you really know that the device you’re reading this on is really yours? This may sound like a strange question but as users of technology, we trust that the devices we use (such as desktops, laptops, tablets and mobile phones) to work as intended and to have not been modified by anyone but the manufacturer. But this is not always the case. Victims of cyber-crimes often overlook the lengths…

Read More

IXCG at Security and Counter Terror Expo 2018

IXCG will be exhibiting at Security and Counter Terror Expo 2018, the UK’s leading event for national security professionals. The expo runs from 6-7th March 2018 and will see over 9,000 visitors from over 110 countries learning about the latest in threats and products, services and systems which can mitigate them. IXCG will be showing the latest in cyber security systems from a number of our partners and explaining how they work together to provide a complete “defence in depth”…

Read More

Disposal of electronic waste – The practicalities and the law

You may not realise it, but when electronic equipment comes to the end of it’s life, there are local laws which govern how it must be disposed of. Modern electronics contain a mix of elements, many of which are environmentally damaging which means that, should they disposed of in normal waste, can pose a severe pollution risk. In Europe this disposal is covered by the Waste of electrical and electronic equipment (WEEE) directive. In addition to the environmental impact, many pieces…

Read More

How to avoid cyber-security incidents

IXCG deals with a large number of malware, virus and cybersecurity incidents every year and, in 90% of cases, a lack of basic planning means that a minor outbreak becomes a major, and very expensive, incident. With prevention costing roughly 5-10% of the cost of an incident, why are so many businesses getting it so wrong? The most common factors with incidents are that the affected organisations either believed that they wouldn’t be a target, or that someone else in…

Read More

The unsavoury side of USB storage

The unsavoury side of USB storage USB storage, (such as thumb drives, hard drives and mobile device integrated storage) is incredibly common in most workplaces. It’s cheap, convenient and provides a way of transferring or backing up large amounts of data easily. And, unfortunately, it is these attributes which make it a huge risk. A hacker’s friend Due to it’s ease of use and popularity, USB storage devices have become the favoured method of attack for many hackers and criminal…

Read More

Is antivirus all you need?

Many companies take they view that as long as they have an antivirus package installed on their computers, they’ll be fully protected from cyber attacks. After all, many antivirus packages offer a wide range types of protection, and are sold as a “one stop” solution, but is that the case? Very often not. What is the point of antivirus products? Computer viruses first appeared in the 1980s and were quite simple. Initially, written as a way of demonstrating the author’s…

Read More

Firewalls explained – A guide for non technical people

You may have heard the term “firewall” before and know that it is something to do with IT security, but what exactly are they and how do they work? With IT security now the responsibility of business owners, partners, directors or charity trustees, it is now important that these people understand what types of firewall exist and how they help protect client data. At it’s most basic, a firewall is a type of filter which ensures that data following between…

Read More

Why small and medium businesses are hackers’ favoured targets

Why small and medium businesses are hackers’ favoured targets According to Watchguard Technologies (a leading Internet security vendor), a staggering 80% of small and medium businesses believe that they’re too small to be of interest to hackers. However, their research shows that it is exactly these companies which are hackers’ favourite targets. But why? A false sense of security leads to an easy target As many small businesses don’t think of themselves as a target, they don’t bother to take…

Read More
Latest Tweets
RT @lastlineinc: What would happen to your #business if you were suddenly denied access to your #network and #data? https://t.co/KLshsGn9Kc…2 hours
RT @WatchGuardUK: Corey is celebrating #CybersecurityAwarenessMonth with a weekly video series. This week he’s sharing four things you shou…2 hours
RT @Layer8ltd: If privacy is important to you, you can be sure it's important to your customers, too. Our toolkit takes the dry out of 'dat…2 hours
3 Amazon Scams to Avoid | Spending | US News https://t.co/9sP8pyzQRD3 hours
UK seeks to secure smart home gadgets - BBC News https://t.co/NxyOBaHYx26 hours