+44 203 9257 909
customerservices@hayachi.com

Securing against Supply Chain attacks

Securing against Supply Chain attacks

What is a Supply Chain attack? A Supply Chain attack is one which targets an individual or organisation through a supplier. This could for example be a phishing attack against a less-secure supplier to garner information about you – the ultimate target. There are simple ways to orchestrate an attack like this actually, through the use of Open Source Intelligence: OSINT. The Defence Security Exhibition International has a publicly available presentation from an expert which runs through the subject in

Read More

Why portable media can by an IT Security risk

Use of portable media is an IT Security risk The Humble USB is something which can be handed out to you simply by walking around an events space or a city centre. It allows you to move data around feely using an open standard, USB 2.0 or USB 3.0. Some USBs even follow the USB-C standard which is akin to a lightning cable. All of these can hold data, which means they can take sensitive data out of your IT

Read More

Securing Financial Services firms

Reliable ways to secure Financial Services firms Financial Services is a heavily regulated industry, alongside general legal requirements for Data Loss Prevention, Financial Services firms have additional Anti-Money Laundering requirements. Aside from regulation Financial Services firms are often the target of complex cyberattacks on account of how money is naturally exchanged through the sector. This can range from broad-brush attacks that affect systems such as Terminal Servers, to Spoofing campaigns where your business’ reputation is used to extract money from your

Read More

IT Security and Building Resilient Infrastructure

How does resilience impact IT Security? Without resilience in an IT Estate your business can quickly find itself ceasing particular activities because of events outside of your control. For example, if you only purchase a single model of a laptop-computer for your whole organisation there is a good chance that certain drivers will cause instability in it over its lifespan. Most organisations keep laptops for three years, and driver updates often occur every few months – but often there are

Read More

Three fundamentals for good IT Security

Things to keep in mind when talking about IT Security IT Security will forever be a compromise – never be afraid to accept some risk Consider the ‘attack surface’ of your IT Estate – how big a target you are You must invest to secure your Endpoints and E-mail, they are the most vulnerable parts of any IT Estate Many IT Service Providers try to obfuscate when it comes to how much their solutions will actually help you. The only

Read More

Data Loss Prevention – why it matters

Data Loss Prevention (DLP) Every organisation in the UK that handles data digitally must register with the Information Commissioner’s Office and take reasonable steps to protect the integrity of their data. In practice this means preventing the loss of your data as well – it isn’t enough to say you have been hacked, and the ICO will fine you for not protecting information. Our client Herbert Smith Freehills have an excellent piece on how fines are calculated here. This is

Read More

Remote Management Software (RMM)

How RMM software can sustain an IT team The ability to have oversight over your organisation is valuable – incredibly valuable – knowing what is installed where, how it is running and being able to routinely report on this allows you to have timely information when you need it. It also saves money by making administration swifter and easier when you need to make changes. Every organisation should use enterprise-class antivirus, this doesn’t mean the most expensive tool on the

Read More

Cloud Security – a different perspective

Taking a leaf from Kendo when talking about Cloud Security Kendo is ‘The Way of The Sword’ – a martial art heavily rooted in Buddhism and seeks to build a culture of striving for improvement. Tackling Cloud Security challenges is not dissimilar to learning Kendo – it is about continuous work to improve a craft, but is naturally impossible to perfect. In that sense it is a realistic worldview that is about consistent hard effort to achieve shared goals. See

Read More

Ransomware – a solution

A solution to the problem known as Ransomware To put it simply Ransomware is the kidnapping of an IT system, typically done by encrypting the drive or boot partitions of an IT estate and then demanding a payment or action in order to be given a decryption key. Many newer Ransomware solutions also allow an attacker to remotely access your system (VNC) and for data-exfiltration which means that an attacker can ransom the data and threaten to leak it without

Read More

Security first: why good enough isn’t good enough anymore

The Computer Security challenge Most solutions require an internet connection and are therein contactable through the internet – be this an internal network (such as within the office) or an external one (through the world-wide-web) such as a web-interface. This is why since 2020 ransomware has become increasingly dangerous for the global economy, from small and medium sized businesses to government departments or critical infrastructure. Their systems are always ‘online’ and so make juicy targets. The requirement for an organisation

Read More
Categories
IT Ninjas Communicate

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com

Seeking Digital Transformation?

Plan and implement a roadmap!

Whether you’re adopting cloud computing and cloud security, automating your IT infrastructure, or working to build a more inclusive and productive culture – our roadmap resource is here for you.

A roadmap provides your business an expression of intent of where you plan to be and how to get there, allowing stakeholders within your organisation understand the end-goal and how it can be achieved.

Hayachi Services are here to help you ensure your Digital Transformation goals are achieved on-time and on-budget.

Get your copy now!