Category: Security News
WatchGuard release IP64 rated Firewall for Industrial operations to withstand dust, moisture and extreme temperatures.
Introducing the new WatchGuard T35-R. The IP64 rated device. Ruggidised security for harsh environments. Traditional firewalls are designed for office environments or rack-mounted in a climate-controlled server room, where issues with temperature, water and dust are negligible. Initiatives to connect and modernize industrial operations require a device that can withstand these conditions, ensure effective security,…
Cyber Awareness – What is port scanning?
Cyber Awareness: What Is Port Scanning? Much like car burglars test door handles to see which cars are locked, a port scan is a process which identifies “open doors” to a computer. Ports are points at which information comes and goes from a computer, so by scanning for open ports, attackers can find weakened pathways with which…
Synology® Introduces Deep Learning NVR DVA3219, Enabling AI-Powered Video Analytics On-Premises
Deep Learning NVR DVA3219: Introducing AI-powered video analytics on premises Built-in analytics modules to deliver actionable insights Advanced deep learning–based algorithms are built into DVA3219 to transform a vast amount of unstructured video data into situational awareness and business intelligence. This can significantly save man-hours while increasing overall security at the same time. We are…
SyTech IT Join forces with Keele University to bring high performing secure Wi-Fi to the new multi-million pound Denise Coates Foundation Building.
SyTech IT Joins forces with Keele University. SyTech IT Join forces with Keele University to bring high performing secure Wi-Fi to the new multi-million pound Denise Coates Foundation Building. SyTech IT has won a new contract with Keele University to provide High Speed Secure Wi-Fi and associated services into the new Denise Coates Foundation Building.…
Are you using FaceApp? Scary Russians? Data Theft?
FaceApp: Is The Russian Face-Aging App A Danger To Your Privacy? No, FaceApp isn’t taking photos of your face and taking them back to Russia for some nefarious project. At least that’s what current evidence suggests. After going viral in 2017, and amassing more than 80 million active users, it’s blowing up again thanks to…
Building Your Cyber Security Strategy in Industry 4.0
Building Your Cyber Security Strategy in Industry 4.0 In the booming age of Industry 4.0 (the fourth and current industrial revolution), manufacturers are replacing legacy shop-floor equipment with “smart” ways and means – enabling safer, more efficient factories with greater Overall Equipment Effectiveness (OEE.) Enterprising new Industrial Internet of Things (IIoT) technologies like construction robotics…
Why 91% of IT and security pros fear insider threat
Why 91% of IT and security pros fear insider threats Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report. The biggest security threat to your business likely isn’t a cybercriminal or hacktivist, but someone already in your organization, according to a Wednesday report from BetterCloud. The…
Making sense of cyber security in OT environments
Do you have an Operational Technology Environment? Are you using the SICS framework? What would life be like without traffic lights, mass-produced food, energy at the touch of a button, or easily available motor fuel? Operational Technology (OT) makes all these things happen and pervades our lives in both obvious and hidden ways, automatically monitoring…
What is WhatsApp Gold? A virus that will put your personal data in danger
What is WhatsApp Gold? A virus that will put your personal data in danger There is a WhatsApp scam doing the rounds which states that users are getting messages to download WhatsApp Gold or WhatsApp Plus. Keep your phone safe from such scams. It’s been doing the rounds since 2016, and now it seems…
Have your details been compromised?
Just how certain are you that your username and passwords are secure? Lets put them to the test then? Think of a card, any card. Now, keep that card in mind and think of another. Repeat until you’ve picked twelve cards—but make sure your selection includes all four suits, at least one ace and…