Small and medium-sized businesses are far more important to UK PLC than many people think. The CBI claims that they account for 99.9% of the private sector and provide 60% of jobs in the sector. And the Department for Business Innovation and Skills (BIS) claims the combined annual turnover of SMEs was £1.6 trillion as of last year, 47% of the total private sector. This makes them an attractive target for cybercriminals, yet many fail to take adequate precautions to secure their IT systems and customer data.
As a trusted advisor to UK small businesses, we recently commissioned research into attitudes towards cyber security. The findings will be an eye-opener for any SME owner who thinks their business too small and insignificant to be targeted by cybercriminals. Join the conversation this week during Small Business Advice Week and follow #SBAW for the latest updates. Continue reading →
According to a new piece of research we conducted with First Base Technologies, the security features on some of the market’s most popular smartwatches have been found to be poor.
Our study, which revealed security flaws in all six of big brand smartwatches on the market, stress-tested devices on physical protection, data connections and information stored to provide definitive results on which ones pose the biggest risk to consumers. Continue reading →
Most IT professionals worth their salt will have heard of the Deep Web. But beyond the salacious reports and hearsay, how many of us really understand what happens on this vast un-indexed area of the web? At Trend Micro we always try to stay one step ahead of the cyber criminals. This is easier said than done, of course, but one strategy we hit upon was to dedicate significant time and resource to uncovering the secrets of the Deep Web.
So that’s exactly what we’ve done. Hopefully the findings of this major new report will help us, and the industry as a whole, better understand the enemy we all face online. Continue reading →
Trend Micro’s Forward Threat Research team in conjunction with the United States Air Force has uncovered a series of attacks against Israeli and Egyptian targets in a report coined “Operation Arid Viper: Bypassing the Iron Dome.” This attack is leveraging unusual tactics to perpetrate both targeted attacks and cybercrime—it’s being executed by what we characterise as “CyberExtremists.”