Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by stuart.gilbertson

HomeArticles Posted by stuart.gilbertsonPage 2
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024
December 14, 2018

Remote Control Our Christmas Lights!

It’s back and bigger than before! Jump onto our dedicated page to control our office Christmas lights remotely from the comfort of your seat!

We’ve gone above and beyond the stress of simply putting up decorations by offering punters the chance to control our office decorations through the miracle of the Internet.

Decorations include glowing fairy-lights, a large six-foot illuminated snowman – which can be inflated on command – and a speaker which can be activated to play a loop of the song ‘Jingle Bells’.

https://christmas.considerit.com

 

stuart.gilbertson
December 14, 2018
0
Share:
November 5, 2018

New Apple MacBook physically disconnects microphone when lid is closed

The latest Apple MacBooks feature a new T2 security chip that physically disconnects the laptop’s built-in microphone whenever the lid has been closed.

In an event at the Brooklyn Academy of Music in New York, the company announced the new security feature to add an extra layer of privacy for all new MacBook users which will prevent hackers and malicious applications from being able to eavesdrop on conversations when the lid is closed on the device.

The company confirmed there was no need to introduce the privacy feature on the webcam because “the field of view is completely obstructed with the lid closed”.

stuart.gilbertson
November 5, 2018
0
Share:
June 13, 2018

Dixons Carphone admits huge data breach just months after receiving one of the largest fines for previous cyber-attack

Dixons Carphone said today that it had suffered a massive data breach involving 5.9 million payment cards and 1.2 million personal data records. The hack attempt which began July 2017 is still under investigation by Dixons Carphone they said.

The news comes months after the Information Commissioner’s Office handed “Carphone Warehouse” a massive fine of £400,000 after serious failures placed customer and employee data at risk. After one of their computer systems was compromised as a result of a cyber-attack in 2015, it transpired that the compromised customer data included: names, addresses, phone numbers, dates of birth, marital status and, for more than 18,000 customers, historical payment card details.

Carphone Warehouse announced they would merge with Dixons in 2014.

Dixons Carphone published a press release today about the latest breach that again shows how likely a cyber attack is and how important it is to be proactive and to have appropriate cyber insurance in place.

Our investigation is ongoing and currently indicates that there was an attempt to compromise 5.9 million cards
in one of the processing systems of Currys PC World and Dixons Travel stores.

…

Separately, our investigation has also found that 1.2m records containing non-financial personal data, such as
name, address or email address, have been accessed.

Dixons Carphone Chief Executive, Alex Baldock, said:

“We are extremely disappointed and sorry for any upset this may cause. The protection of our data has to be at the heart of our business, and we’ve fallen short here. We’ve taken action to close off this unauthorised access and though we have currently no evidence of fraud as a result of these incidents, we are taking this extremely seriously. We are determined to put this right and are taking steps to do so; we promptly launched an investigation, engaged leading cyber security experts, added extra security measures to our systems and will be communicating directly with those affected. Cyber crime is a continual battle for business today and we are determined to tackle this fast-changing challenge.”

Rightfully worried about your cyber exposure? Get in touch today and we can chat about how we can help.

stuart.gilbertson
June 13, 2018
0
Share:
May 30, 2018

BCC is really difficult…

Ghostery, UK councils, and vitamin sellers all falling foul of GDPR, by sending list of e-mail contacts in CC rather than BCC.

Ghostery have published a summary on their website which reads:

  • Ghostery sent out an email on May 25, 2018 that unintentionally resulted in the exposure of some account holders’ email addresses.
  • Only email addresses were exposed.
  • You are not affected if you use Ghostery but did not provide an email address to us.
  • You are not affected if you did not receive the GDPR email from Ghostery.
  • As soon as we found out, we stopped using the email distribution tool.
  • Ghostery is currently working to rectify the incident and we will keep our users updated.

The company has since apologised for the error, saying that it had recently stopped using a third-party email automation platform and was managing emails in its own system in a bid to be more secure.

Nutrition business Vitl also fell foul of basic e-mail etiquette by sending an email update without bothering about the difference between CC and BCC.

The list doesn’t stop there. Marsha De Cordova MP’s office also sent an email to their constituents with the same blunder, effectively releasing the distribution contact list to everyone receiving the email.

stuart.gilbertson
May 30, 2018
0
Share:
May 24, 2018

FBI seizes domain behind massive botnet

The FBI has seized a domain linked to what’s believed to be a Russian botnet composed of around 500,000 infected routers around the world. According to the Department of Justice, the botnet is under the control of Russian hacking group “fancy bear” or “Sofacy.” Sofacy use malware called “VPN Filter” to exploit the vulnerabilities in routers manufactured by by Linksys, MikroTik, NETGEAR, and TP-Link and QNAP.

On Wednesday security researchers at Cisco and Symantec separately provided new details on the malware, which has turned up in 54 countries including the United States.

The FBI has been investigating the botnet since at least August, according to court records, when agents in Pittsburgh interviewed a local resident whose home router had been infected with the Russian malware. “She voluntarily relinquished her router to the agents,” wrote FBI agent Michael McKeown, in an affidavit filed in federal court. “In addition, the victim allowed the FBI to utilize a network tap on her home network that allowed the FBI to observe the network traffic leaving the home router.”

Source(s): https://www.thedailybeast.com/exclusive-fbi-seizes-control-of-russian-botnet

https://www.engadget.com/2018/05/24/fbi-seizes-domain-russian-botnet/?guccounter=1

 

stuart.gilbertson
May 24, 2018
0
Share:
May 18, 2018

The Crown Prosecution Service (CPS) fined £325,000 by the ICO for losing unencrypted DVDs

On 18 November 2016, the CPS received a package of 15 unencrypted DVDs from Surrey Police. Those DVDs contained recordings of intimate sensitive personal data of victims, as well as the sensitive personal data of the perpetrator. On the same day, the receiving CPS office in Guildford sent the package of DVDs to its office in Brighton, where a specialist unit would review the evidence contained on them.

The DVDs were sent by tracked DX delivery in a single box. DX logs confirm that the package was sent to the CPS Brighton office on 18 November 2016. The package was delivered to the Brighton office of the CPS – located in a shared building – on 21 November 2016. The CPS does not believe that its staff were in the building at the time.

The entry doors to the office building are locked and require a card and PIN code for access. DX has a code to enable it to make early morning deliveries before normal working hours. When DX makes early morning deliveries to the CPS Brighton office, they are left in an unsecured area in reception. Once in the building, the CPS office – including the reception area in which deliveries are left – can be accessed by anyone.

It was not until 1 December 2016 that the loss of the DVDs was discovered. The loss wasn’t reported to Surrey Police until 14 December 2016, almost a month after the loss.

The DVDs were not encrypted. The CPS has stated that it is not normal practice to encrypt this kind of material. Encryption software is, however, available to all areas of the CPS.

The ICO was not notified of the data loss until 11 April 2017. The CPS were therefore fined £325,000 for losing the unencrypted storage media. The DVDs have never been found.

This is the second penalty imposed on the CPS following the loss of sensitive video recordings. The ICO ruled that the CPS was negligent when it failed to ensure the videos were kept safe, and did not take into account the substantial distress that would be caused if the videos were lost.

It also found that, despite being fined £200,000 following a separate breach in November 2015 – in which victim and witness video evidence was also lost – the CPS had not ensured that appropriate care was being taken to avoid similar breaches re-occurring.

Steve Eckersley, Head of Enforcement, said:

The victims of serious crimes entrusted the CPS to look after their highly sensitive personal data – a loss in trust could influence victims’ willingness to report serious crimes.

The CPS failed to take basic steps to protect the data of victims of serious sexual offences. Given the nature of the personal data, it should have been obvious that this information must be properly safeguarded, as its loss could cause substantial distress.

The CPS must take urgent action to demonstrate that it can be trusted with the most sensitive information.

stuart.gilbertson
May 18, 2018
0
Share:
May 9, 2018

Durham school paid out £1,500 in ransom money after cyber-attack

In April 2017 a computer virus encrypted the Durham Sixth Form Centre college files. The County Durham school confirmed it had made a payment of £1,500 to recover the data and it had informed the police about the attack.

The school has not confirmed the source of the attack, but it happened at the same time as the global WannaCry cyber-attack on businesses and banks across the world, as well as the NHS.

Durham County Council has refused to comment on the school’s case as it manages its own IT system.

Source: http://www.bbc.co.uk/news/uk-england-tyne-44045355

stuart.gilbertson
May 9, 2018
0
Share:
April 25, 2018

Hotel door locks vulnerable to hack

Researchers say flaws they found in the equipment’s software meant they could create “master keys” that opened the rooms without leaving an activity log.

The F-Secure team said it had worked with the locks’ maker over the past year to create a fix.

The researchers’ attack involves using any ordinary electronic key to the target facility – even one that’s long expired, discarded, or used to access spaces such as a garage or closet. Using information on the key, the researchers are able to create a master key with privileges to open any room in the building. The attack can be performed without being noticed.

https://press.f-secure.com/2018/04/25/f-secure-researchers-master-keys-to-hotels-can-be-created-out-of-thin-air/

stuart.gilbertson
April 25, 2018
0
Share:
April 12, 2018

European electrical grid fixed, 6 minutes brought back

Last month, the European Network of Transmission System Operators (ENTSO-E) publicly admonished Serbia and Kosovo for not properly balancing their grids. Their negligence caused the grid to drop from its usual 50Hz to 49.996Hz. This meant that over the course of three months, any clocks that synchronised their time using the grid lost six minutes.

“This average frequency deviation, that has never happened in any similar way in the CE [Continental Europe] Power system, must cease,” the group wrote. “ENTSO-E is urging European and national governments and policymakers to take swift action.”

This week, ENTSO-E announced that oven, microwave, and alarm clocks across the continent were no longer six minutes slow. They ran the continental grid at a slightly higher frequency than normal (50.01Hz) for the same time-period until the clocks were back in sync.

stuart.gilbertson
April 12, 2018
0
Share:
April 10, 2018

IT meltdown causes national government shutdown

Sint Maarten, which used to be part of the Netherlands Antilles, and has a population of just over 42,000, has closed government offices during this bizarre outage.

A local newspaper confirmed a cyber-attack on Monday 2nd April, and that as of today, the Government were still struggling to recover.

PHILIPSBURG – The Ministry of General Affairs hereby informs the public that the recovery process of the Government of Sint Maarten ICT Network is progressing steadily and will continue throughout the upcoming weekend following the cyber-attack on Monday April 2nd.

Upon completion of the assessment, the ICT Department is taking all necessary precautions during the recovery process. Thus, all departments that render service to the public will remain closed. An update will be given to the public on Sunday evening April 8th as to the progress made with the restoration of the ICT Network.

Update: as of 10:38am Monday 9th April the Government confirmed on Facebook that offices remained closed to the public.

stuart.gilbertson
April 10, 2018
0
Share:
1 2 3 … 14
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited