£36m lost to fraud and cyber crime in 2020

In 2019, an estimated 1.92 billion people purchased goods or services online – and that number is growing year-on-year. However, those shopping online must be wary when making any online purchases, as our latest research has found that £36,262,000 has... Read More

Understanding the Cybersecurity Maturity Model Certification (CMMC)

Long-standing information security best practices, frameworks, and regulations are a reliable means for ensuring that networks are resilient, and information remains secure. Still, oftentimes organizations and individuals will have their own interpretation of such security practices but that may... Read More

three random words

How to make three random words secure

When the National Cyber Security Centre (NCSC) started promoting three random words as passwords, the general public had practical advice that was easy to follow. While it is extremely valuable to provide sound advice for choosing passwords, the perceived... Read More

New job creation from foreign investment in the UK 2020

Foreign Investment in UK Foreign investment in the UK is very important for the performance, growth and success of various economic variables. This being especially true for employment. With Brexit causing a lot of economic and political uncertainty, it... Read More

Specops Software

Specops Software acquired by Monterro

Stockholm, August 21, 2019 – Specops Software is excited to announce that the equity investment firm, Monterro has become the majority owner of Specops Software. Specops Software and Monterro jointly see the acquisition as a great opportunity for accelerated... Read More

Unencrypted biometrics reveal massive risk

Security researchers gained access to more than 27.8 million records, including fingerprints, facial recognition data, usernames and passwords, in the mostly unencrypted and unhashed Biostar 2 database. Biostar 2 is a web-based biometrics locking system used for physical security... Read More

How to audit network passwords

The quality of your security program comes down to the core element of passwords. Uncovering its weaknesses involves more than annual password audits. Read More