SyTech IT Join forces with Keele University to bring high performing secure Wi-Fi to the new multi-million pound Denise Coates Foundation Building.

SyTech IT Joins forces with Keele University. SyTech IT Join forces with Keele University to bring high performing secure Wi-Fi to the new multi-million pound Denise Coates Foundation Building. SyTech IT has won a new contract with Keele University to provide High Speed Secure Wi-Fi and associated services into the new Denise Coates Foundation Building.  Located on Keele University’s Science …

IOT Manufacturing Industry 4.0 Cyber Security

Building Your Cyber Security Strategy in Industry 4.0

Building Your Cyber Security Strategy in Industry 4.0 In the booming age of Industry 4.0 (the fourth and current industrial revolution), manufacturers are replacing legacy shop-floor equipment with “smart” ways and means – enabling safer, more efficient factories with greater Overall Equipment Effectiveness (OEE.) Enterprising new Industrial Internet of Things (IIoT) technologies like construction robotics and smart assembly lines are …

Why 91% of IT and security pros fear insider threat

Why 91% of IT and security pros fear insider threats Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report. The biggest security threat to your business likely isn’t a cybercriminal or hacktivist, but someone already in your organization, according to a Wednesday report from BetterCloud. The vast majority (91%) of the …

Making sense of cyber security in OT environments

Do you have an Operational Technology Environment? Are you using the SICS framework? What would life be like without traffic lights, mass-produced food, energy at the touch of a button, or easily available motor fuel? Operational Technology (OT) makes all these things happen and pervades our lives in both obvious and hidden ways, automatically monitoring and controlling processes and equipment …

Have your details been compromised?

Just how certain are you that your username and passwords are secure? Lets put them to the test then?   Think of a card, any card. Now, keep that card in mind and think of another. Repeat until you’ve picked twelve cards—but make sure your selection includes all four suits, at least one ace and one face card, and no …

Hackers account for 90% of login attempts at online retailers

Hackers account for 90% of login attempts at online retailers From credit card details to premium cheese, hackers are after you!   Selling stolen personal data is a big business for hackers: Somewhere on the dark web, your e-mail address and a few passwords are probably for sale (hopefully, old ones). Cyber criminals buy troves of this information to try …

Microsoft Vulnerabilities Report – Download

Microsoft Vulnerabilities Report 2017 Download the Microsoft Vulnerabilities Report 2017 The 2017 Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by 111% over five years. The ever-popular report makes the compelling case for least privilege, finding that of the 235 Critical vulnerabilities reported in 2017, 80% would be mitigated by removing local admin rights from …