IT Security Centre - News, Help and Advice
Providing IT security news, help and advice for IT professionals and for people who want to know more about IT security.
We are small group of IT professionals from differing backgrounds.
Between us we are offer help and advice for all, having previously worked as IT security Analysts, Systems Administrators and IT Security Consultants.
We want to continue to grow to be a central source for the UK IT Security community involving many people from within the community.
We want to connect more and more IT security professional to help and support each other...
We offer a variety of news, information, advice and help and will continue to grow...
Your help and support is essential in expanding our reach and growing the IT security community in the UK...
We try to provide the best and most up to date information available and your thoughts on what we share and how we can improve on what we do is invaluable...
We are very ambitious and really want to grow and grow to make a real difference to the IT security community in the UK...
"An excellent website and blog for IT security news and solid professional help and advice on IT issues ."
"I very much enjoy browsing your site, it is very professionally produced with top quality articles."
"Always excellent quality pieces in-depth and informative, keep it up!"
IT security news, IT security help and advice, a central point for IT security related information in the UK.
Images of seven people were passed on by local police for use in a facial recognition system at King’s Cross in London in an agreement that was done in secret, the d
If you're concerned about the Windows 10 privacy of your data, you don't want to leave the default settings please read below to alter them to suit your needs.
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but remember that these digital certificates have built-in expiration.
U.K. universities will continue to face cyberattacks from nation-state actors and organised criminal gangs in the years ahead, according National Cyber Security
Microsoft is working on enhancing the notification system for quarantined malware or phishing messages for admins in all Microsoft 365 environments, with the new fea
The UK wants investment in a cyber security capacity building, and emphasised the importance of respecting international law as it applies to digital, at a newly con
Organisations need to be cautious when it comes to the security implications of moving to 5G. 5G technology is bringing in an entirely new set of standards for globa
The option for Ransomware Protection is disabled by default even though it is available as a native option since the release of Windows 10 version 1709.
There is no shortage of data breaches and vulnerabilities that have very real financial and reputational consequences for businesses.
A demilitarized zone (DMZ) refers to a host or network that acts as a secure and intermediate network or path between an organisation's internal network and the outi
A dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary
Like actual fishing, it’s no fun to be on the end of the hook. Phishing is defined as the fraudulent use of electronic communications to deceive and take advantage o
What is the following command used for? net use \targetipc$ "" /u:""
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
Which among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?