+44 203 9257 909
customerservices@hayachi.com

The Conversation, on facial recognition technologies

The Conversation, on facial recognition technologies

Facial recognition technology: how it’s being used in Ukraine and why it’s still so controversial Facial recognition technology is controversial in many countries. Shutterstock Felipe Romero Moreno, University of Hertfordshire Facial recognition technology is being used in warfare for the first time. It could be a game changer in Ukraine, where it is being used to identify the dead and reunite families. But if we fail to grapple with the ethics of this technology now, we could find ourselves in a

Read More

The Cost of Cloud Security

The Cost of Cloud Security There are a variety of reasons why investing in the security of your business is critical to you staying in-business, but many firms often believe they have certain capabilities such as backups or advanced antivirus when they in fact lack any of these capabilities. For a definition of ‘the Cloud’ please see here. One common example is when organisations move to Microsoft’s Office 365 platform or Google’s GSuite in the belief that this offers greater

Read More

IT Security in Conflict Zones

IT Security in Conflict Zones is complex When numerous small organisations or large private organisations face cyber-attacks from state-backed criminal hacking-groups a lot of harm can be done. These can take the form of supply-chain attacks such as the worldwide damage Solarwinds experienced, or targeted attacks on infrastructure such as Ransomware or Phishing attacks. Ransomware and Phishing attacks can be done in high volumes and at scale, targeting particular industries or types of businesses. Key-stakeholders within a business are often

Read More

The Conversation, on Buying a Smart Device

Considering buying a smart device? To protect your security, ask yourself these five questions Dragana Gordic/Shutterstock Iain Nash, Queen Mary University of London Houses are getting smarter: smart thermostats manage our heating, while smart fridges can monitor our food consumption and help us order groceries. Some houses even have smart doorbells that tell us who is on our doorstep. And of course, smart TVs allow us to stream the content we want to watch, when we want to watch it. If

Read More

Securing Mobile Devices

Securing Mobile Devices Mobile Devices can be Smartphones, OEM Tablets, standard Tablets and even Laptops depending on your definition. Some laptops now use the same ARM-chips which Smartphones use, resulting in them being treated as a Mobile Device by IT systems. You may wonder why organisations need to secure a Smartphone, but the real question is whether it is connected to your business IT systems – even if only email. In the event the answer is yes, then it is

Read More

Open Source Intelligence and Communities

What is Open Source Intelligence? Open Source Intelligence (OSINT) is not particular to IT Security and instead is a much broader concept – it is about the free flow and analysis of information from a wide variety of sources. Many intelligence communities including British Intelligence are increasingly using OSINT to expand their capabilities. The open-source element can be software or community, for example it can be the toolset an IT Security vendor uses to support businesses of all sizes, or

Read More

Christmas Hackers – how a SOC protects you

Christmas Hackers When there is cheer and joy at work and home it is often the case that individuals are quite vulnerable to external influence. During December many individuals and businesses who they work for or represent are more susceptible to a cyber-attack. There are a mixture of reasons why but primarily it is because individuals are on holiday, there are breaks in communication between stakeholders and buyers and perhaps that people are a little too busy preparing for events

Read More

Monitoring Software

What is Monitoring Software? Monitoring software is designed to enable an IT Department to retain visibility of all their IT systems, from standard PCs to complex infrastructure designed for datacentres. A network management agent allows you to monitor all desktops, servers, laptops, printers, firewalls, routers and switches. This is achieved through leveraging SNMP, NetFlow, Syslog, Traps and configuration backup – in effect everything every IT system uses to report on their status. Our Security Operations Centre (SOC) As A Service solutions

Read More

Identifying Cyber Security Incidents

What is a Cyber Security Incident? The UK is lucky to have a National Cyber Security Centre, a government-led centre of expertise and resources, so Hayachi Services will defer to their definition: 1. Attempts to gain unauthorised access to a system and/or to data. 2. The unauthorised use of systems for the processing or storing of data. 3. Changes to a systems firmware, software or hardware without the system owners consent. 4. Malicious disruption and/or denial of service. Tools and

Read More

IT Security for Barristers

IT Security for Barristers As self-employed specialists who deal with sensitive data, a Barrister will often face complex IT Security requirements with very tight budgets. This is especially the case if your clients require Legal Aid, in fact at that point it would be fair to say your budget is near-nil. Hayachi Services are experts at working with legal and professional services firms, so even if your legal practice is an army of one, you are in safe hands with

Read More
Categories
IT Ninjas Communicate

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com

Seeking Digital Transformation?

Plan and implement a roadmap!

Whether you’re adopting cloud computing and cloud security, automating your IT infrastructure, or working to build a more inclusive and productive culture – our roadmap resource is here for you.

A roadmap provides your business an expression of intent of where you plan to be and how to get there, allowing stakeholders within your organisation understand the end-goal and how it can be achieved.

Hayachi Services are here to help you ensure your Digital Transformation goals are achieved on-time and on-budget.

Get your copy now!