IT Security Centre - News, Help and Advice
Providing IT security news, help and advice for IT professionals and for people who want to know more about IT security.
We are small group of IT professionals from differing backgrounds.
Between us we are offer help and advice for all, having previously worked as IT security Analysts, Systems Administrators and IT Security Consultants.
We want to continue to grow to be a central source for the UK IT Security community involving many people from within the community.
We want to connect more and more IT security professional to help and support each other...
We offer a variety of news, information, advice and help and will continue to grow...
Your help and support is essential in expanding our reach and growing the IT security community in the UK...
We try to provide the best and most up to date information available and your thoughts on what we share and how we can improve on what we do is invaluable...
We are very ambitious and really want to grow and grow to make a real difference to the IT security community in the UK...
"An excellent website and blog for IT security news and solid professional help and advice on IT issues ."
"I very much enjoy browsing your site, it is very professionally produced with top quality articles."
"Always excellent quality pieces in-depth and informative, keep it up!"
IT security news, IT security help and advice, a central point for IT security related information in the UK.
The IoT represents a very real challenge to the users of billions of devices worldwide.
HM Revenue and Customs is seeking an application to allow its field officers investigating fraud to record and process the information.
Disaster recovery experts Databarracks has revealed that an alarming number of UK firms lack confidence in their disaster recovery capabilities.
The UK cyber security services market is one of the most advanced in the world.
The Ministry of Justice is looking for a partner to assist with a “comprehensive review” and subsequent update of its security policies and guidance.
X-Force Red say it’s a novel and effective way for an attacker to gain an initial foothold on a target’s network.
The zero-trust concept is often reffered to as “trust no one, verify everything.” No enterprise can stop off the myriad of cyberthreats as long as they assume that a
Much of the internet is a great resource for kids, whether it's Wikipedia for helping with homework, online games, social networks, videos, music and more.
The option for Ransomware Protection is disabled by default even though it is available as a native option since the release of Windows 10 version 1709.
Like actual fishing, it’s no fun to be on the end of the hook. Phishing is defined as the fraudulent use of electronic communications to deceive and take advantage o
Media reports often refer to the shady side of hacking, what most people usually assume as hoodie-wearing recluses that go out of their way to cause havoc on busines
Media reports often highlight the dark side of hacking, what most people usually assume as hoodie-wearing geeks that go out of their way to cause havoc on businesses
An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtu
Which information security goal is impacted when an organisation experiences a DoS or DDoS attack?
After 10 years working in her organisation, Andrew is moving into her fourth role, this time as a manager in the accounting department. What issue is likely to show