+44 203 9257 909
customerservices@hayachi.com

Ransomware – a solution

Ransomware – a solution

A solution to the problem known as Ransomware To put it simply Ransomware is the kidnapping of an IT system, typically done by encrypting the drive or boot partitions of an IT estate and then demanding a payment or action in order to be given a decryption key. Many newer Ransomware solutions also allow an attacker to remotely access your system (VNC) and for data-exfiltration which means that an attacker can ransom the data and threaten to leak it without

Read More

Security first: why good enough isn’t good enough anymore

The Computer Security challenge Most solutions require an internet connection and are therein contactable through the internet – be this an internal network (such as within the office) or an external one (through the world-wide-web) such as a web-interface. This is why since 2020 ransomware has become increasingly dangerous for the global economy, from small and medium sized businesses to government departments or critical infrastructure. Their systems are always ‘online’ and so make juicy targets. The requirement for an organisation

Read More

The Conversation, on Technological Innovation in Defence

Militaries plunder science fiction for technology ideas, but turn a blind eye to the genre’s social commentary Pavel Chagochkin/Shutterstock Will Slocombe, University of Liverpool Military planning is a complicated endeavour, calling upon experts in logistics and infrastructure to predict resource availability and technological advancements. Long-range military planning, deciding what to invest in now to prepare armed forces for the world in thirty years’ time, is even more difficult. One of the most interesting tools for thinking about future defence technology isn’t

Read More

The Conversation, on Responding to Cyber Warfare

Should cyberwar be met with physical force? Moral philosophy can help us decide seaonweb/Shutterstock Christopher J. Finlay, Durham University In conventional warfare, it’s accepted that if a state finds itself under attack, it’s entitled to respond – either with defensive force, or with a counterattack. But it’s less clear how countries should respond to cyber-attacks: state-backed hacks which often have dangerous real-world implications. The 2020 SolarWinds hack, attributed to state-backed Russian hackers, breached security at around 100 private companies. But it

Read More

The Conversation, on Spyware

Spyware: why the booming surveillance tech industry is vulnerable to corruption and abuse Zoomik/Shutterstock Christian Kemp, Anglia Ruskin University The world’s most sophisticated commercially available spyware may be being abused, according to an investigation by 17 media organisations in ten countries. Intelligence leaks and forensic phone analysis suggests the surveillance software, called Pegasus, has been used to target and spy on the phones of human rights activists, investigative journalists, politicians, researchers and academics. NSO Group, the Israeli cyber intelligence firm behind

Read More

The Conversation, on Cyber Warfare

Cyber-attacks: what is hybrid warfare and why is it such a threat? Novikov Aleksey via Shutterstock Ethem Ilbiz, University of South Wales and Christian Kaunert, University of South Wales Washington and Moscow are engaged in a war of words over a spate of ransomware attacks against organisations and businesses in the US and other countries. These increasingly sophisticated cyber-attacks represent a new type of warfare aimed at disorganising and even destroying a nation’s economy. This has been called “hybrid warfare”. It’s

Read More

Where do you store your Intellectual Property?

The why and how of ensuring Intellectual Property is stored securely on your systems Recent developments in the software sphere demonstrate how your organisation’s intellectual property is undermined through the use of SaaS solutions such as GitHub. This piece by FOSSA explores how the GitHub Co-Pilot development tools are able to draw on your own projects to ‘share’ the expertise with other GitHub customers. This demonstrates the need for secure storage for commercially sensitive data to be stored on your own

Read More

The Conversation, on Fastly’s internet meltdown

Fastly’s global internet meltdown could be a sign of things to come David S. Wall, University of Leeds For an hour on the morning of June 8, dozens of the world’s most-visited websites went offline. Among those affected were Amazon, Reddit, PayPal and Spotify, as well as the Guardian, the New York Times and the UK government website, gov.uk. Together, these websites handle hundreds of millions of users. You can listen to more articles from The Conversation, narrated by Noa,

Read More

The Conversation, on a decade hacktivism

A decade since ‘the year of the hacktivist’, online protests look set to return NeydtStock/Shutterstock Vasileios Karagiannopoulos, University of Portsmouth Many of us vaguely remember the word “hacktivism” from a decade ago. This was a time before serious ransomware attacks dominated current cybersecurity concerns, when certain hacking techniques were being used to send political messages to governmental and corporate entities. Hacktivism has since retreated as a form of protest, in part due to the prosecution of prominent hacktivists, sometimes with

Read More

Endpoint Security Explained

First we’ll start with a definition of what an Endpoint actually is: a network-connected computing device. Quite broad, yes: practically this can be (among other things); Servers (including virtual machines) Network infrastructure (firewalls, switches, etc.) Laptop(s) Desktop(s) Smart Phone(s) Smart Device(s), be it a Fish-Tank or a Fridge We often use the analogy of a Castle, as do the National Cyber Security Centre: if a single door (or back-door) is left unwatched and unguarded, who’s to say our castle won’t

Read More
Categories
IT Ninjas Communicate

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com

Seeking Digital Transformation?

Plan and implement a roadmap!

Whether you’re adopting cloud computing and cloud security, automating your IT infrastructure, or working to build a more inclusive and productive culture – our roadmap resource is here for you.

A roadmap provides your business an expression of intent of where you plan to be and how to get there, allowing stakeholders within your organisation understand the end-goal and how it can be achieved.

Hayachi Services are here to help you ensure your Digital Transformation goals are achieved on-time and on-budget.

Get your copy now!