Subscribe to One Blog for the Latest Industry News, Disruptive Tech Ideas and Impactful Thought Leadership.

Protect Your Mobile Like Any Other Device

Posted by Guest Blogger on 21/02/22 10:47

A few years ago, if your phone happened to be hacked, someone would only gain access to your contacts and text conversations. Now, however, our lives revolve around our mobile devices as we not only use them to communicate but to pay for our morning coffee, track our workouts, watch videos, browse the internet, store photos and access files. 

KEEP READING

Topic mobile Internet mobile mobile security cyber security

A Cyber Essentials Update Is Coming On 24th January: Are You Ready?

Posted by James Griffiths on 14/01/22 15:55

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses to survive the pandemic that’s held the world captive for the past two years. These dramatic changes over a short period of time presented cybercriminals with new opportunities for exploitation. 

KEEP READING

Topic mobile Internet mobile security cyber security

Introducing Cyber as a Service

Posted by David Woodfine on 08/12/21 16:18

The ideal solution to deal with your security woes. Ever heard of a successful breach that didn’t take advantage of a vulnerability in a firm’s cyber security posture? Neither have we! Staying one step ahead of cybercriminals is challenging. Once a vulnerability is identified, there is nothing to stop cybercriminals from trying their luck.

KEEP READING

Topic mobile Internet mobile security cyber security

​​The Rising Popularity of NFTs and The Rising Security Threat

Posted by David Woodfine on 10/11/21 16:10

The art world is known for being ahead of the curve, adopting new and interesting technologies to push the boundaries of what we define art to be. Currently, the hottest pieces to land in the art scene are non-fungible tokens, otherwise known as NFTs, which have grown so much in popularity that people are willing to spend incredible amounts on these intangible assets.

KEEP READING

Topic mobile Internet mobile security cyber security

Common Security Incidents

Posted by David Woodfine on 05/10/21 16:03

How Much Do You Know About Cyber Security Threats? And Is It Enough? At the moment, it seems like everyone is talking about cyber security, and rightly so! As more companies make the shift towards embracing new tech, like cloud-based services to manage their private data and IT infrastructures, it’s natural that protecting that data is going to be the main concern. 

KEEP READING

Topic mobile Internet mobile security cyber security

FluidOne’s cyber partners CSA add Lookout Mobile Endpoint Security to growing solutions portfolio

Posted by David Woodfine on 05/10/21 14:49

Following the global pandemic, the mass migration to remote working was a necessary move. As things have begun to return to the ‘new normal,’ however, we noticed that many sectors are planning to stick with remote and hybrid models of working and are therefore continuing to rely on the use of mobiles and tablets to routinely access corporate data. However, since iOS, Android and Chrome OS devices host a treasure trove of data, there’s an urgent need for these devices to be secured from the growing cyber threat. 

KEEP READING

Topic mobile Internet mobile security cyber security

Is Cyber Training and Education working?

Posted by David Woodfine on 08/09/21 15:56

The report from the ICO on the ‘surprising’ decline in personal data breaches has certainly opened up a topic of debate, which clearly leads us to think: is our cyber training and education really working?

KEEP READING

Topic mobile Internet mobile security cyber security

Poly Network Hack

Posted by David Woodfine on 13/08/21 15:39

On 10th August 2021, Poly Network announced in a tweet that it had been attacked. Not only had their network been breached, but the hacker had transferred enormous sums to their addresses right under Poly Network’s nose.  

KEEP READING

Topic mobile Internet mobile security cyber security

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Posted by Luke Osborne on 07/07/21 16:38

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis, has been caught targeting Microsoft IIS servers by exploiting vulnerabilities. In this blog, we’re taking a look at Sygnia’s Incident Response Team’s report on the current events regarding the threat actors activities, how they do it and more importantly, how you can protect yourself. 

KEEP READING

Topic mobile Internet mobile security cyber security

Why the Digital Divide isn’t just about Internet Access

Posted by Dan Pope on 12/02/15 09:12

Tuesday marked the eleventh anniversary of Safer Internet Day – a day dedicated to teaching young people and carers the importance of staying safe online. As usual, as part of this year’s campaign we saw a number of shocking statistics including the fact that nearly a third of all 11-16 year olds say that they have been targeted by mean or cruel behaviour online in the past year. Furthermore, one in twenty 11-16 year olds say that they feel that people are mean to them “most of the time” while online.

KEEP READING

Topic mobile Internet digital divide News online safety Safer Internet Day