Check out all of our upcoming events

Blog

Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

Cyber

Post COVID-19: What will the world look like from a security perspective?

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 07 April 2020. Posted in Cyber

Remote working has suddenly become the norm for the foreseeable future, with estimates that up to half of the UK’s work force will adopt a work from home posture in the coming months. Whilst some may relish the opportunity of having lunch with their family or flexible working hours and advocates of remote working promoting the increase in productivity, the reality is that this will put a significant strain on networks everywhere.

Preparing for Cyber Warfare: Strengthen your NetSecOps with nation-scale attack simulation

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 27 March 2020. Posted in Cyber

Cyber warfare is raging, public and private organisations are on the back foot

The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on the back foot when it comes to fending off intelligent, determined and motivated attackers focussed on inflicting cyber warfare and cybercrime attacks on their targets. Such has been the concern of the impact on a global footing, the World Economic Forum’s Global Risk Landscape report has previously rated cyber-attacks to be one of the highest risks in terms of impact and likelihood, only closely behind natural disasters and extreme weather events.

SecOps: What is it and why is it essential for your business?

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 24 March 2020. Posted in Cyber

Cybercrime brings significant costs to organisations in both taking proactive steps to prevent attacks and the reactive actions necessary to deal with the consequences. Effective security operations, or SecOps, are crucially important to safeguard the profitability of organisation, whether this is protecting against threats that may impact client relationships or protecting the organisations IP. 

Covid-19 and the evolving cyberthreat landscape

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Monday, 23 March 2020. Posted in Cyber

The World Health Organisation has categorised the Coronavirus (Covid-19) as a pandemic and it is changing the lives of everyone across the world. While the U.K. government announced on Monday that people should work from home many organisations, Telesoft Technologies included, had already started putting plans in place and taking action to adapt their networks and infrastructure so that their employees are able to work from home. This enforced digital transformation doesn’t come without risks though. As organisations try to rapidly enable their staff to remain working, it can be easy to lose sight of the importance of system and network security and simply focus on usability and accessibility.

Phishing vs Spear Phishing: What are they and how can you avoid them?

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Monday, 24 February 2020. Posted in Cyber

Spearphishing is a targeted attack towards specific individuals usually via email (although it can be executed via phone calls, text messages, applications or social networks) with the intent to either infect the victim’s device with malware or trick them to replying with sensitive information.

Social Engineering explained...What is it and how can you protect yourself from an attack

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Thursday, 30 January 2020. Posted in Cyber

Social engineering is a term used to describe the manipulation of human psychology, a weakness that has the potential to be found and influenced in every individual within every organisation, from the contractors and service workers through to the front of house staff and directors. Third parties and contractors are just as likely to be exploited as someone who works directly for the company.

5 Actionable Steps You Can Take To Prevent a Cyber Attack

on Friday, 03 January 2020. Posted in Cyber

At a recent talk, BlackHat Europe 2019, A.P. Moller Maersk A/S Chief Information Security Officer, Andrew Powell, narrated Maersk’s response to NotPetya, which provided a very interesting insight into how Maersk dealt with falling victim to such an attack. According to Andrew Powells’ methodology, the key to this is plain and simple; ‘transparency.’

The APT Series: APT Attack Process Infographic

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Wednesday, 20 November 2019. Posted in Cyber

To wrap up our three-part APT blog series we have created ​an infographic that shows the five stages of an APT attack, offering opportunity for identification. Advanced Persistent Threats (APTs) are complex and efficient cyber espionage campaigns, seeking to gain intelligence from Industry leaders and Critical National Infrastructure. Using the latest tools, with strong threat intelligence, continual testing and a strong human firewall are all key elements to making sure you stay one step ahead of APT groups.

The APT Series Part 3: The Future of Advanced Persistent Threat Groups

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 22 October 2019. Posted in Cyber

Rise in sovereign data laws shows how weaponised data has become. Data continues to grow day by day, driven by 5G, the Internet of Things (IoT), Industry 4.0, Smart Cities and network evolutions. This rise in data is resulting in a large emphasis being placed on Edge technologies, cloud storage solutions and big data in the form of data lakes. All of this is in an effort to handle the enormous amounts of data that is being generated every second with an attempt to limit the on premise resources required by organisations across the globe. It has been estimated that by 2025, as much as 463 exabytes of data will be created globally, every day

The APT Series Part 2 'APT33'

on Friday, 11 October 2019. Posted in Cyber

The Elfin team are more commonly known as APT33 (they also go by other names like Refined Kitten, Magnallium and Holmium) and have been identified to be supported and sponsored by the Iran Government. APT33 have been operating since 2013.

[12 3 4 5  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.