All posts

Ransomware vs. Endpoint Security

Results from the largest public ransomware test

CrowdStrike Falcon Ransomware

Ransomware is the most visible, most easily understood cyber threat affecting businesses today. Paralysed computer systems mean stalled business and loss of earnings. We tested CrowdStrike Falcon’s endpoint security vs. ransomware.

Continue reading “Ransomware vs. Endpoint Security”
All posts

Cyber Security DE:CODED Series Two

All episodes of Cyber Security DE:CODED, Series Two

New episodes on the last Wednesday of the month.

Find all of the episodes from the award-winning Cyber Security DE:CODED podcast in one handy place.

Find all of the episodes from Cyber Security DE:CODED Series Two here. Use the Subscribe links above to connect our podcast with your favourite podcast platform and ensure you get the next episodes before anyone else.

Episodes

Bonus episodes

Continue reading “Cyber Security DE:CODED Series Two”
All posts

Beware fake anti-virus reviews

You need anti-virus and there is a load of advice online about which to buy. Who can you trust?

best anti-virus

Some anti-virus reviewers know what they are talking about. Others don’t. Some are just in it for the money. How can you tell which reviews are worth your time?

How to choose anti-virus for your PC and your family

Most people believe that you should run anti-virus on your PC. Independent security experts, governments and every computer journalist on the planet promotes this advice. And they are not wrong. There is no doubt that installing anti-virus is one of the most important things you can do to keep your computer and its data safe.

Continue reading “Beware fake anti-virus reviews”
All posts

Cyber Security DE:CODED – Cloud security

“As long as anything is online, it’s open for strangers to try to break protection”

[buzzsprout episode=’10578736′ player=’true’]

Show notes for series 2, episode 4

The ‘cloud’ is integrating with our lives at ever more useful (or intrusive!) levels. We look at what securing the cloud means in the real world.

Is it possible to secure your online life when you don’t control all of the systems in use?

Is anyone testing cloud security, or do we simply need to accept marketing claims?

Don’t lose your cryptocurrency to hackers and scammers. Our security tips focus on cryptocurrency investors.

What does a personal hack attack look like? Backups never seems more attractive…

Guests on this month’s Cyber Security DE:CODED podcast include Eugene Kaspersky (Kaspersky) and Luis Corrons (Avast).

Security Life Hack from Chad Skipper (VMware)!

Continue reading “Cyber Security DE:CODED – Cloud security”
All posts

Cyber Security DE:CODED – Can Microsoft solve security?

“I have a PC… I like their delete key, which doesn’t exist on the Mac.”

[buzzsprout episode=’10575429′ player=’true’]

Show notes for series 2, episode 1

Can Microsoft solve security? Do you need anti-virus on your smartphone? And are Macs more secure than PCs?

We ask Eugene Kaspersky (Kaspersky) and Christian Seifert (Microsoft).

This episode’s Security Life Hack from Mikko Hyppönen (WithSecure)!

Continue reading “Cyber Security DE:CODED – Can Microsoft solve security?”
All posts

Security planning for normal people

The first security technique you should master!

Security planning for normal people

Security planning can make your life easier to manage. It’s easy to become paralysed when you consider all of the threats that exist and all of the possible solutions. You can’t buy every security product available and you certainly shouldn’t even try.

There are risks that we all face (let’s call those ‘general risks’) and risks that are quite specific to you (‘individual risks’).

Security planning for anyone, whether you are the CEO of a large enterprise or a retired amateur gardener, should take into account what risks you (specifically) face and the consequences of something bad actually happening.

General risks

In this article we’re going to focus on cybersecurity, but the principles apply to any area of your life. In the computing world there are three major threats that we all face:

Continue reading “Security planning for normal people”
All posts

Bluffer’s guide to home cyber security

Keep your devices safe and help others too!

home cyber security

Everyone needs to protect themselves online. There is a lot of advice out there but much of it is confusing and contradictory. We’ll show you simple but effective steps you can take to put yourself in the top ranks. And you can help your friends and loved ones stay safe too.

Welcome to the Bluffer’s Guide to Home Cyber Security!

This article is going to tell you everything you need to know to stay safe online. It won’t baffle you with too much detail. But rest assured, although the steps are simple they are backed up by our thorough and unbiased understanding of how computer security works. We don’t have anything to sell you. This is all good, free advice.

Continue reading “Bluffer’s guide to home cyber security”
All posts

Enterprise Advanced Security test expanded

The Enterprise Advanced Security testing programme includes new attack groups.

Enterprise Advanced Security

Our Enterprise Advanced Security (EAS) tests can assess any security software, hardware appliance, cloud service or combination thereof. Always evolving, these tests have expanded to include new attacks.

(These tests were originally called the Breach Response test. We renamed them for a number of reasons.)

Hackers and way they hack

Research on real attacker behaviour is a fundamental element of our EAS testing. Our team looks at the real-world behaviour of advanced threat groups, known as Advanced Persistent Threats (APTs).

Continue reading “Enterprise Advanced Security test expanded”
All posts

Can general security tests be useful?

Real-world security reports don’t always reflect your real world.

Real-world security reports

What makes a real-world security test useful? Does it need to provide a full assessment of a product or service? An assessment that is directly relevant for all potential customers? Or does it need to give just a taste of how effective a product can be?

The perfect security test

Tests can vary in how they are run and the level of information that they provide. Not all tests are equally reliable or even useful. But one thing they all have in common is that they aren’t perfect. Let’s look at how tests are limited, how you can interpret them and what the future holds.

Continue reading “Can general security tests be useful?”
All posts

Cyberattacks use your own tools

Security testing needs to be more realistic and subtle than just running malware

Cyberattacks use your own tools

Your own network can provide everything that an attacker needs to achieve its goal. In many ways it’s impossible to tell the difference between an effective attacker and a good systems administrator.

Continue reading “Cyberattacks use your own tools”

Contact us

Give us a few details about yourself and describe your inquiriy. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us