Davey Winder
The truth about ransomware
An abstract image showing a man trying to connect to a computer encrypted by ransomware
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
14 Oct 2020
The truth about ransomware
An abstract image showing a man trying to connect to a computer encrypted by ransomware
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
14 Oct 2020
Secure your Wi-Fi against hackers in 10 steps
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
What is NoOps?
Cyber security automation mockup
DevOps

What is NoOps?

There are numerous approaches to in-house development; we explore one that focuses squarely on efficiency
4 Jul 2020
Why and how I enrolled in Google’s Advanced Protection Program
cloud security

Why and how I enrolled in Google’s Advanced Protection Program

Physical security keys are at the heart of the company’s efforts to protect high-profile targets
28 Apr 2020
Remote support is a fact of life…
remote access

Remote support is a fact of life…

Now you need to deal with the security risk
11 Apr 2020
Does your business need its own VPN?
virtual private network (VPN)

Does your business need its own VPN?

You might assume that a company VPN is overkill for small businesses, but it's increasingly a necessity for most businesses
23 Mar 2020
If not passwords then what?
cyber security

If not passwords then what?

Google and Microsoft have both talked up a passwordless future, but what does that mean and is the technology ready to make it happen anytime soon?
8 Jan 2020
What is penetration testing?
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
Compromising email accounts is easier than you might imagine
Security

Compromising email accounts is easier than you might imagine

Why you should take steps to protect your business from zombie phishing attacks
11 Aug 2019
The A-Z of security threats 2018
Security

The A-Z of security threats 2018

Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
What is a cyber kill chain?
Graphic of a cyber criminal or hacker
cyber attacks

What is a cyber kill chain?

How understanding the progression of an online attack can help you defend your business
13 Jul 2018
Social engineering: your business' biggest security risk
Padlock being lifted by a fishing hook on a blue background to symbolise phishing attacks
social engineering

Social engineering: your business' biggest security risk

It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Move over VMs, the future of app deployment is in containers
virtualisation

Move over VMs, the future of app deployment is in containers

A look at a more flexible and efficient way to isolate and modularise your apps
10 Apr 2018
Secure your Wi-Fi against hackers in 10 steps
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
How to build web traffic without turning to the dark side
Network & Internet

How to build web traffic without turning to the dark side

You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
How to protect against cyber threats
Security

How to protect against cyber threats

IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
Brace yourself for Brexit
Brexit
public sector

Brace yourself for Brexit

Leaving the EU is supposed to give British businesses a boost, but it might not be as simple as that
30 May 2017
Why SMBs need a good disaster recovery plan in place
Security

Why SMBs need a good disaster recovery plan in place

Work in a small business? Then you’re a target for ransomware
14 May 2017
Why UK government must get strategic about cybersecurity
Security

Why UK government must get strategic about cybersecurity

Government investment in cybersecurity is great, but what matters is where the money goes
22 Feb 2017
How to carry out workplace email surveillance
Email surveillance
Security

How to carry out workplace email surveillance

Want to monitor employee communications? Davey Winder explains your rights and obligations
19 Sep 2016
Five security threats Windows 10 protects you against
Security

Five security threats Windows 10 protects you against

Love it or hate it, Windows 10 is a pretty secure OS
9 Aug 2016
Four cheap dark web cyber threats
hacking

Four cheap dark web cyber threats

Hackers are turning to the dark web for cheap exploits - here's how to protect your business
29 Jun 2016
Five weirdest password alternatives of all time
Security

Five weirdest password alternatives of all time

Computers can identify you based on your butt and your walk, not to mention your smell...
14 Jun 2016
Privacy is the collateral damage in our war on terror
Security

Privacy is the collateral damage in our war on terror

More UK citizens must value privacy for government to leave our data alone
23 May 2016
Ethical hackers are finally getting their rewards
Hacking on keyboard
hacking

Ethical hackers are finally getting their rewards

For too long, the unsung heroes of cybersecurity have been undervalued
3 May 2016
Why a nation state isn't behind the Panama Papers hack
hacking

Why a nation state isn't behind the Panama Papers hack

Mossack Fonseca had its data stolen via an embarrassingly easy security flaw
11 Apr 2016
Encryption is a touchy subject for the Home Office
Encryption
Security

Encryption is a touchy subject for the Home Office

Theresa May's Modern Crime Prevention Strategy: strong on rhetoric, light on security measures
24 Mar 2016
Budget 2016: What about cybersecurity spending?
George Osborne
Opinion

Budget 2016: What about cybersecurity spending?

George Osborne's failure to explain how cyber budget will be spent was a missed opportunity
16 Mar 2016
Why Macs are no more secure than the rest of them
Apple MacBook Retina 12in review
malware

Why Macs are no more secure than the rest of them

Mac users are fiercely defending their platform's security after KeRanger, but they're wrong to
11 Mar 2016
RSA 2016: FBI and NSA line up next to security vendors
NSA data
Security

RSA 2016: FBI and NSA line up next to security vendors

The Apple-FBI encryption battle rightly dominates discussion at security conference
3 Mar 2016
Would a Brexit weaken data privacy in the UK?
public sector

Would a Brexit weaken data privacy in the UK?

Data privacy should be a central issue in debate of EU referendum pros and cons
26 Feb 2016
FBI wants a legal backdoor from Apple, not a technical one
Security

FBI wants a legal backdoor from Apple, not a technical one

Is the FBI's court ruling about more than getting into San Bernardino killer's iPhone?
17 Feb 2016
Safer Internet Day could teach businesses a thing or two
Security

Safer Internet Day could teach businesses a thing or two

Safer Internet Day 2016 promotes better web security for families - but corporations should listen up as well
9 Feb 2016
Why Privacy Shield will fail to protect our data
data protection

Why Privacy Shield will fail to protect our data

Safe Harbour’s replacement is based entirely on trust - what a big mistake
8 Feb 2016