+44 (0)203 9257 909
customerservices@hayachi.com

Securing Financial Services firms

Securing Financial Services firms

Reliable ways to secure Financial Services firms Financial Services is a heavily regulated industry, alongside general legal requirements for Data Loss Prevention, Financial Services firms have additional Anti-Money Laundering requirements. Aside from regulation Financial Services firms are often the target of complex cyberattacks on account of how money is naturally exchanged through the sector. This can range from broad-brush attacks that affect systems such as Terminal Servers, to Spoofing campaigns where your business’ reputation is used to extract money from your

Read More

IT Security and Building Resilient Infrastructure

How does resilience impact IT Security? Without resilience in an IT Estate your business can quickly find itself ceasing particular activities because of events outside of your control. For example, if you only purchase a single model of a laptop-computer for your whole organisation there is a good chance that certain drivers will cause instability in it over its lifespan. Most organisations keep laptops for three years, and driver updates often occur every few months – but often there are

Read More

Three fundamentals for good IT Security

Things to keep in mind when talking about IT Security IT Security will forever be a compromise – never be afraid to accept some risk Consider the ‘attack surface’ of your IT Estate – how big a target you are You must invest to secure your Endpoints and E-mail, they are the most vulnerable parts of any IT Estate Many IT Service Providers try to obfuscate when it comes to how much their solutions will actually help you. The only

Read More

Data Loss Prevention – why it matters

Data Loss Prevention (DLP) Every organisation in the UK that handles data digitally must register with the Information Commissioner’s Office and take reasonable steps to protect the integrity of their data. In practice this means preventing the loss of your data as well – it isn’t enough to say you have been hacked, and the ICO will fine you for not protecting information. Our client Herbert Smith Freehills have an excellent piece on how fines are calculated here. This is

Read More

Remote Management Software (RMM)

How RMM software can sustain an IT team The ability to have oversight over your organisation is valuable – incredibly valuable – knowing what is installed where, how it is running and being able to routinely report on this allows you to have timely information when you need it. It also saves money by making administration swifter and easier. Every organisation should use enterprise-class antivirus, this doesn’t mean the most expensive tool on the market – simply the one best

Read More

Cloud Security – a different perspective

Taking a leaf from Kendo when talking about Cloud Security Kendo is ‘The Way of The Sword’ – a martial art heavily rooted in Buddhism and seeks to build a culture of striving for improvement. Tackling Cloud Security challenges is not dissimilar to learning Kendo – it is about continuous work to improve a craft, but is naturally impossible to perfect. In that sense it is a realistic worldview that is about consistent hard effort to achieve shared goals. See

Read More

Ransomware – a solution

A solution to the problem known as Ransomware To put it simply Ransomware is the kidnapping of an IT system, typically done by encrypting the drive or boot partitions of an IT estate and then demanding a payment or action in order to be given a decryption key. Many newer Ransomware solutions also allow an attacker to remotely access your system (VNC) and for data-exfiltration which means that an attacker can ransom the data and threaten to leak it without

Read More

Security first: why good enough isn’t good enough anymore

The Computer Security challenge Most solutions require an internet connection and are therein contactable through the internet – be this an internal network (such as within the office) or an external one (through the world-wide-web) such as a web-interface. This is why since 2020 ransomware has become increasingly dangerous for the global economy, from small and medium sized businesses to government departments or critical infrastructure. Their systems are always ‘online’ and so make juicy targets. The requirement for an organisation

Read More

The Conversation, on Technological Innovation in Defence

Militaries plunder science fiction for technology ideas, but turn a blind eye to the genre’s social commentary Pavel Chagochkin/Shutterstock Will Slocombe, University of Liverpool Military planning is a complicated endeavour, calling upon experts in logistics and infrastructure to predict resource availability and technological advancements. Long-range military planning, deciding what to invest in now to prepare armed forces for the world in thirty years’ time, is even more difficult. One of the most interesting tools for thinking about future defence technology isn’t

Read More

The Conversation, on Responding to Cyber Warfare

Should cyberwar be met with physical force? Moral philosophy can help us decide seaonweb/Shutterstock Christopher J. Finlay, Durham University In conventional warfare, it’s accepted that if a state finds itself under attack, it’s entitled to respond – either with defensive force, or with a counterattack. But it’s less clear how countries should respond to cyber-attacks: state-backed hacks which often have dangerous real-world implications. The 2020 SolarWinds hack, attributed to state-backed Russian hackers, breached security at around 100 private companies. But it

Read More
Categories

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com