Unlocked London | Cybersecurity Conference

Call us on 0800 954 0895

SecureIT Logo

Topics

Cyber Terrorism

Cyber Terrorism

Unlike typical attacks, which are designed to cause disruption and generate a significant financial return for the perpetrator, cyber-terrorism aims to cause physical violence or extreme economic damage.

To achieve such outcomes, cyber-terrorists are most likely to select high-impact targets such as military institutions and power plants. The potential for catastrophic destruction to the infrastructure of society gives cause for cyber-terrorism to be of great concern for the government and private organisations. 


Becoming Ransom-aware

Becoming Ransom-aware

Ransomware is a malicious form of software designed to deny access to computer systems until a specified sum of money is paid. Ransomware is amongst the most common methods of inflicting damage on UK businesses alongside distributed denial-of-service (DDoS) attacks.

In the latter half of 2015 and early 2016, 40% of UK businesses fell victim to ransomware attacks, causing a fifth to shut down and a third to suffer revenue loss.

Attackers use various infiltrative techniques from hacking to social engineering – including phishing and baiting – to infect victims’ computers, smart and internet of things (IoT) devices and routers with ransomware.

It is vital that businesses are aware of what makes an organisation vulnerable to a ransomware attack and the steps they must take to strengthen their digital defences.

Live Ethical Hacking

Live Ethical Hacking Demo

Where is your business’s computer system most vulnerable?

Defence is the best form of attack in cybersecurity. Expert ethical hackers identify and target vulnerabilities in your system to expose just how simple it is for a breach of your network to occur and where the weaknesses lie.

Artificial Intelligence and the Internet of Things

The Future of Security, Artificial Intellegence and the Internet of Things

The increasingly large number of connected devices presents new security challenges.

In October 2016 the Dyn network, which controls a substantial portion of the internet’s domain name system (DNS) infrastructure, experienced a DDoS attack on a record-breaking scale,  involving an estimated 100,000 malicious endpoints. The accessibility of IoT devices such as smartphones, Google’s Nest and Fitbits, creates opportunities for hackers if the necessary security protocols and secure cloud infrastructure are not in place.

GDPR

General Data Protection Regulation (GDPR)

The deadline for the EU’s new legislation for the protection of personal data, the General Data Protection Regulation, is just a year away.

That’s not long to get your house in order to ensure compliance with the Regulations standards. And there’s quite a lot to take in to consideration. Don’t risk a fine of up to £17.25m or your business’s reputation. Start to get to know the Regulation and your new responsibilities.

In partnership with...

Microsoft Gold Certified Partner
Secarma
Cisco Powered

S-IA

UKFast