Only 20% of UK public can identify secure password, IET reveals

New research from the Institution of Engineering and Technology (IET) reveals that only one in five people in the UK can correctly identify a secure password over a compromised one. Despite expressing fear about potential hacking incidents in the future…

What will the NIS2 Directive mean for smaller organisations

First established in July 2016, The Network and Information Systems Directive (NIS), encompassed two groups— the operators of essential services; and relevant digital service providers. The aim of the directive was to strengthen cybersecurity resilience and, while somewhat effective, it…

Healthcare industry disillusioned in cyberattack preparedness

Kroll has released the State of Cyber Defence: Diagnosing Cyber Threats in Healthcare report, exposing the healthcare industry’s disillusionment in terms of its cyber maturity. The research reveals that over a quarter (26%) of healthcare businesses have immature cybersecurity processes…

Axiomtek’s new DIN-rail cybersecurity gateway: iNA200

Axiomtek has announced the iNA200, a DIN-rail cybersecurity gateway for OT (operational technology) network security. The iNA200 (pictured below) is powered by the Intel Atom x6212RE or x6414RE processor (Elkhart Lake) and has one DDR4-3200 SO-DIMM for up to 32GB of…

IoT live attack simulation platform announced

Security company Sternum has announced the release of the first real-world attack simulation and evaluation platform, enabling IoT device designers to evaluate their devices against some of the most severe cyber threats. The threats to IoT devices continue to grow…

Risky business: SMEs’ use of customer data

For small and medium-sized enterprises (SMEs) in the UK, customer data and cybersecurity are often paramount to success. And with the ongoing COVID-19 pandemic affecting how businesses operate and interact with their customers, keeping data safe has never been so…

Ethical hacking: cybersecurity in the automotive industry

Technology and embedded systems are becoming more advanced and more common in businesses, meaning there is always the risk of hacking and security breaches. It’s important to remember, not all hackers are criminals. Ethical hacking has become increasingly popular as…

Test specification to comply with Consumer IoT security standard

ETSI has released the test specification for the existing ETSI EN 303 645, the consumer IoT security standard. This test specification, ETSI TS 103 701, describes how a conformity assessment is performed in a structured and comprehensive way. This will allow supplier…