+44 (0)203 9257 909
customerservices@hayachi.com

Securing Mobile Devices

Securing Mobile Devices

Securing Mobile Devices Mobile Devices can be Smartphones, OEM Tablets, standard Tablets and even Laptops depending on your definition. Some laptops now use the same ARM-chips which Smartphones use, resulting in them being treated as a Mobile Device by IT systems. You may wonder why organisations need to secure a Smartphone, but the real question is whether it is connected to your business IT systems – even if only email. In the event the answer is yes, then it is

Read More

Open Source Intelligence and Communities

What is Open Source Intelligence? Open Source Intelligence (OSINT) is not particular to IT Security and instead is a much broader concept – it is about the free flow and analysis of information from a wide variety of sources. Many intelligence communities including British Intelligence are increasingly using OSINT to expand their capabilities. The open-source element can be software or community, for example it can be the toolset an IT Security vendor uses to support businesses of all sizes, or

Read More

Christmas Hackers – how a SOC protects you

Christmas Hackers When there is cheer and joy at work and home it is often the case that individuals are quite vulnerable to external influence. During December many individuals and businesses who they work for or represent are more susceptible to a cyber-attack. There are a mixture of reasons why but primarily it is because individuals are on holiday, there are breaks in communication between stakeholders and buyers and perhaps that people are a little too busy preparing for events

Read More

Monitoring Software

What is Monitoring Software? Monitoring software is designed to enable an IT Department to retain visibility of all their IT systems, from standard PCs to complex infrastructure designed for datacentres. A network management agent allows you to monitor all desktops, servers, laptops, printers, firewalls, routers and switches. This is achieved through leveraging SNMP, NetFlow, Syslog, Traps and configuration backup – in effect everything every IT system uses to report on their status. Our Security Operations Centre (SOC) As A Service

Read More

Identifying Cyber Security Incidents

What is a Cyber Security Incident? The UK is lucky to have a National Cyber Security Centre, a government-led centre of expertise and resources, so Hayachi Services will defer to their definition: 1. Attempts to gain unauthorised access to a system and/or to data. 2. The unauthorised use of systems for the processing or storing of data. 3. Changes to a systems firmware, software or hardware without the system owners consent. 4. Malicious disruption and/or denial of service. Tools and

Read More

IT Security for Barristers

IT Security for Barristers As self-employed specialists who deal with sensitive data, a Barrister will often face complex IT Security requirements with very tight budgets. This is especially the case if your clients require Legal Aid, in fact at that point it would be fair to say your budget is near-nil. Hayachi Services are experts at working with legal and professional services firms, so even if your legal practice is an army of one, you are in safe hands with

Read More

Chambers Cybersecurity: retaining business

Why your Chambers Cybersecurity posture affects retention of business The results of a GOV.UK survey(external link) released in March 2020 re-established that cyber security breaches are becoming ever more frequent. The UK Government found 46% of UK businesses and charities reported a cyber-attack during the year. Of those, 33% claimed they experienced a successful cyber-attack against their systems at least once a week in 2020 – up from 22% in 2017. This of course also applies to Barristers’ Chambers – and when you are self-employed there are two things you need to

Read More

Email Security

Email Security Email Security is the primary vector of attack for cyber-criminals; in short this means if you want cost-effective security, invest early in Email Security and Endpoint Security. When a cyber-criminal sends a Phishing email to you we highly recommend having a reporting process and tool ready to help you combat it. This can be through the NCSC’s reporting service or within your vendor’s systems. Often Phishing is used to validate information and identify people who are vulnerable to an

Read More

IT Security for Small Business

IT Security for Small Business Small Business are not resistant to shocks, the Federation of Small Business advise that every year 50,000 small businesses close due to late payments but there are other threats that can result in not even being able to manage payments or cashflow. IT Security for Small Business will always be a challenge as SMEs need to balance the risks of a cyberattack with things like late payment. Cash in the bank is central to any business,

Read More

Sustaining Network Security

Network Security – Making IT work Sustaining Network Security is fundamental to protecting your business. Many organisations will purchase a Firewall but fail to regularly patch (that is, update) their systems and this in turn creates vulnerabilities that cyber-criminals take advantage of. Many smaller businesses and charities naturally cannot afford annual penetration tests and monthly review of their IT Estates in order to confirm that everything is functional. This is despite 33% of new malware (Malicious Software) being file-less, and

Read More
Categories
IT Ninjas Communicate

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com