News

Managing Insider Threat

A lot of focus is placed on managing external threats by organisations, when in fact their biggest asset is also their biggest risk: People (Insider Threat). You can’t run a business without giving employees  access to resources, and you can’t give them that access without some degree of risk.  An insider threat is when a […]

Find out more

Managing Insider Threat

A lot of focus is placed on managing external threats by organisations, when in fact their biggest asset is also their biggest risk: People (Insider Threat). You can’t run a business without giving employees  access to resources, and you can’t give them that access without some degree of risk.  An insider threat is when a […]

Find out more

Load More

Tips for ensuring your employees can securely work from home

As millions of workers log into work from home to avoid the spread of COVID-19, organisations need to make working from home seamless and secure. Here are Smarttech247’s top tips for working from home securely. Encrypt devices. When assigning laptops or other mobile devices to remote workers, encrypt hard drives to protect any data stored […]

Find out more

GDPR for Start-ups: Practical Steps To Compliance

It is a very common misconception that the General Data Protection Regulation (‘GDPR’) applies to only large, multinational organisations. Contrary to popular belief, GDPR does not depend on the number of people employed within your organisation, it considers the data you are processing, the reason you are processing and what risk does this processing ascertain […]

Find out more

5 Common Misconceptions About GDPR And Why They Can Hurt Your Business

From the outset, many misconceptions about the General Data Protection Regulation have arisen; from ‘it is IT’s problem’ right up to ‘it’s the next Y2K’. Although it has only been a few months since the implementation of the regulation, many misconceptions continue to arise on a regular basis. Over the past few weeks, Smarttech247 has […]

Find out more

The Anatomy of a Compromised Network (Part 1)

A couple of years ago I had set up a honeypot to study the behaviour of botnets on smart systems. I was interested in how they become compromised and the speed at which different classes of remote commands are executed. One of the most interesting things that were observed was the seemingly normal behaviour several […]

Find out more

From EU GDPR to AI – Cyber Security Predictions For 2018

With 2018 approaching fast on the horizon, the cybersecurity community questions whether or not the lessons taught in 2017 will have fallen upon deaf ears.  2017 marks one of the biggest years in history for high-profile data breaches, and 2018 will be no different. As cyber-criminals become more skilled in their work and their technologies […]

Find out more

Quick Guide: How To Stay Up-to-Date On Security Trends

3 Major Cybersecurity Trends in 2017 Smarttech

Cyber Security is a fast-moving topic and what we have come across lately is that staying up to date can be challenging, especially in a busy environment. However, keeping informed on the latest security threats will help you apply more effective defense strategies and also help you educate your users by spreading the word about attacks and […]

Find out more

Smarttech Helps Abtran To Secure Their Business From Online Threats With IBM Watson for Cybersecurity

Two and a half quintillion bytes of data are generated around the world every day. In fact, 90% of the world’s data has been created in the last two years alone. As companies are struggling to get to grips with data management, there is also an evolving challenge in regard to cyber security and organisations’ […]

Find out more

Dirty COW Linux Kernel Vulnerability

A serious privilege escalation vulnerability in Linux kernel affects most of Linux servers Although most of “branded” vulnerabilities are objects of fun for the ITSEC community because of their over-hype, the one here is nothing to laugh about. “Dirty COW” is the name of a new vulnerability discovered in Linux kernel. It was discovered on […]

Find out more

GDPR and IoT: Key Considerations

The forthcoming European General Data Protection Regulation will probably be the toughest law that aims at protecting EU citizens from privacy and data breaches. It is, however, alarming how unprepared businesses are for this regulation and how little they know about it. One interesting area to look at is the IoT environment. A large number of […]

Find out more