Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Category: IT Security

HomeArchive by Category "IT Security"Page 6
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

ICO fines Nursing and Midwifery Council £150,000

The Information Commissioner’s Office has urged organisations to review their policies on how personal data is handled, after the Nursing and Midwifery Council was issued a £150,000 civil monetary penalty for breaching the Data Protection Act.

The council arranged for the DVDs, which contained confidential video files relating to alleged offences by a nurse as well information about two vulnerable children, to be couriered to a hearing in October 2011. Upon arrival it was found that the package didn’t contain the DVDs.

The council lost three DVDs related to a nurse’s misconduct hearing, which contained confidential personal information and evidence from two vulnerable children. An ICO investigation found the information was not encrypted. The DVDs are yet to be found.

David Smith, Deputy Commissioner and Director of Data Protection, said:

“It would be nice to think that data breaches of this type are rare, but we’re seeing incidents of personal data being mishandled again and again.
While many organisations are aware of the need to keep sensitive paper records secure, they forget that personal data comes in many forms, including audio and video images, all of which must be adequately protected.”

Further details about today’s case can be found on the ICO’s civil monetary penalty notice page.

 

stuart.gilbertson
February 18, 2013
0
Share:

Skype: lol is this your new profile pic? Virus

There is currently a massive increase in complaints from Skype users in relation to viruses. The newest and the one that seems to be infecting a lot of users at the moment is one that sends a message  to the users with the text:

lol is this your new profile pic?

The users are asked to then click a link and are taken to a downloadable .ZIP file which will infect your computer.

Skype advise that all users update their Skype application and make sure they have up to date anti virus running at all times. More importantly, we advise users to be cautious. When you see links from friends, always be careful and check that they are genuine.

stuart.gilbertson
November 8, 2012
0
Share:

URGENT Tax Rebate? – delete it immediately

Emails that claim to be “Urgent” are highly likely to contain malware as attachments a new report reveals. FireEye released a report (view it here) that details a list of top words used in phishing emails (those are emails that pertain to be from various legitimate sources with the intent of infecting the machine or conning the user to give out important information).

The attackers mainly use zip files to hide their malware, ultimately aimed at gaining access to valuable corporate and intellectual data. It appears very few corporate establishments block these kinds of executables, which FireEye’s research confirms.

The report also shows a decrease in the use of ZIP files from last year (2011), a decrease in the use of standalone EXE executables, but an increase in PDF files. Adobe Reader, FoxIT Reader and other widely available PDF readers come with the ability to enable a Safe Reading Mode, which in theory, should prevent malicious code within PDF files from executing. In Adobe, Edit -> Preferences -> JavaScript  -> uncheck Enable Acrobat JavaScript checkbox to do this today.

 

Now, .ZIP files represent the vast majority, 76.91%, of advanced malicious files. The complexity of
these attachments, which can contain many distinct files and file types, coupled with a lack of
user awareness of the danger of these file extensions, has made them a highly effective means for
distributing malware and effectively exploiting systems.
PDFs also pose a significant threat. These file types are ubiquitous and familiar to just about every
computer user. Further, many users are unaware of the fact that malware can be distributed through
PDF files, and malware embedded in these file types is proving to be difficult for conventional defenses
to detect. For all these reasons, PDFs provide cybercriminals with a very effective means of attack.

http://www.fireeye.com/resources/pdfs/fireeye-top-spear-phishing-words.pdf

stuart.gilbertson
September 26, 2012
0
Share:

Malware installed at the factory on new PCs!

Hackers have managed to install malware on to brand new factory built and sealed PCs. This brings a whole new meaning to the old term “All Your PCs are belong to us!”

Microsoft is warning that cybercriminal gangs have managed to get the Nitol bug and other dangerous malware software installed to one in five laptops and PCs checked by their investigators. To avoid any confusion, it should be noted that reputable vendors such as Dell, HP etc. are not affected by this.

The malware installed could give the criminals control of the computers, allowing them to watch every tap of the keyboard to steal personal information including your name, address, details of any holidays and credit card information – whether it’s going down an encrypted channel or not.

“We found malware capable of remotely turning on an infected computer’s microphone and video camera, potentially giving a criminal eyes and ears into a vicitm’s home or place of business,” reported Microsoft investigator Richard Dormingues Boscovich.

The Nitol bug has the potential for the most damage as it tries to link the PC to a botnet which criminals can use for hacking attacks, deliberately crashing servers or performing illegal activities under the IP Address of an unknowing user.

Microsoft discovered the bugs in laptop and desktop PCs purchased in cities around China. Four of the computers were infected with malware despite being new and factory sealed.

Investigations led them to a domain name which is alleged to have been involved in cybercrime since 2008. Microsoft have been granted permission to take over the domain name and close down the botnet.

“Cybercriminals have made it clear that anyone with a computer could become an unwitting mule for malware,” said Mr Boscovich.

So if you’re planning a trip to China then be safe and purchase your computer back home before travelling, and even then give it a good anti virus scan!

Article by Iain

stuart.gilbertson
September 14, 2012
0
Share:

Police Website Hacked

A Hertfordshire police website has been hacked, leading to the publication of what appear to be login details and passwords for dozens of officers and part of the police force’s website has been taken down as a “precaution” while investigations continue. Hertfordshire Police said information stored on an externally hosted database had been published on the internet.

The information which includes phone numbers and IP addresses, relates to a number of officers in Safer Neighbourhood Teams.

The Police force said in a statement:

“Hertfordshire Constabulary is currently investigating following the publication on the internet of information stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website.

“As a precaution these pages have been temporarily disabled whilst the circumstances as to how this information was obtained is investigated.

“There is absolutely no suggestion that any personal data relating to officers or members of the public has been, or could have been compromised.

“Nevertheless matters of IT security are extremely important to the Constabulary and an investigation is already under way.”

stuart.gilbertson
August 31, 2012
0
Share:

Glasgow City Council unencrypted laptop stolen

A laptop containing the personal information and bank account details of thousands of people and businesses has been stolen from Glasgow City Council.

The local authority is now contacting 37,835 affected customers, including suppliers and people receiving winter fuel payments and care grants.

Strathclyde Police and the Information Commissioner have been informed about the theft, which took place last month.

The laptop was password-protected but not encrypted.

It was one of two laptops stolen during a break-in at the council offices in Cochrane Street some time between Monday 28 and Tuesday 29 May.

The local authority said the full extent of the data loss did not become apparent until last Wednesday.

The information on the laptop relates to 17,692 companies and 20,143 individuals.

It includes names and addresses and, in the case of 16,451 customers, bank account details.

A full internal audit is being carried out.

A council spokesman said: “We are in the process of writing to the people affected by this theft to alert them to the data loss and offer them advice about what steps they might need to take.

“We’ve also provided them with a phone number they can use to contact us if they have any questions.

“We are sorry that this has happened and apologise for the inconvenience it has caused. Anyone with any information on the theft should contact Strathclyde Police.”

He added: “Customers should remember that no one from the council would ever call at their home or telephone them to ask for personal information, such as banking details.

“A bank will never ask for a customer’s PIN or for a whole security number or password.”

Affected customers can contact the council on 0141 287 0400.

Source: http://www.bbc.co.uk/news/uk-scotland-glasgow-west-18399576

stuart.gilbertson
June 12, 2012
0
Share:

Scottish charity loses two unencrypted memory sticks

A Scottish charity – based in Glasgow – breached the Data Protection Act after two unencrypted memory sticks and papers containing the personal details of up to 101 individuals were stolen from an employee’s home.

The information included peoples’ names, addresses and dates of birth, as well as a limited amount of data relating to the individuals’ health. The charity – Enable Scotland (Leading the Way) – promptly reported the incident to the ICO in November 2011 and informed those individuals affected.

The ICO’s investigation found that the information should have been deleted from the memory sticks once it had been uploaded onto the charity’s server. The charity had no specific guidance for home workers on keeping personal data secure, and portable media devices used to store sensitive personal information were not routinely encrypted.

Ken Macdonald, Assistant Commissioner for Scotland said:

“Organisations that use memory sticks to store personal information must make sure the devices are properly protected. Encrypting the data means that the information will remain safe even if the device is later lost or stolen. It is also important that employers provide home workers with guidance on how to keep any personal data taken outside of the office secure, as this is potentially when the information is most vulnerable.

“We are pleased that Enable Scotland has taken action to keep people’s information safe, however this incident should act as a warning to all charities that they must ensure that personal information is handled correctly.”

Peter Scott, Chief Executive of Enable Scotland, has now signed an undertaking, committing the charity to improving its compliance with the Data Protection Act. This includes making sure laptops used to store sensitive personal data are encrypted. Hard copy files will only be removed from the office when absolutely necessary and will contain the minimum amount of personal data required. Guidance will also be provided to home workers, to ensure that any personal data taken outside of the office is kept secure.

stuart.gilbertson
March 12, 2012
0
Share:

Symantec victim of cyber attack

Edinburgh IT Support company, Consider IT, has recently learned that security software publisher Symantec has confirmed it was recently the victim of a cyber attack, resulting in the theft and disclosure of product source code. Via its website, the company affirmed Anonymous’ claims, citing a source code heist dating back to 2006. The post goes on to suggest that users running Norton Antivirus Corporate Edition, Norton Internet Security, Norton SystemWorks, Symantec Endpoint Protection 11.0, or Symantec AntiVirus 10.2 apply the latest maintenance patches.

Earlier this month, the online-collective Anonymous stated, via Twitter, that it possessed portions of the code in question and planned to release it in support of a class-action lawsuit filed by consumers – the suit claims Symantec employed scare tactics to encourage users to purchase its wares. If you have the company’s pcAnywhere solution deployed, Symantec suggests only using it for “business critical purposes,” as this software is “at increased risk.” Those looking to stay up-to-date on the breach and what Symantec is doing to ameliorate its effects can get the blow-by-blow from the source link below.

The security vendor said at the time that because the code is old, customers running Norton products today should not be in any increased danger of cyberattacks. However, the company admitted that users of pcAnywhere, which has not changed as much as the Norton products over the past few years, might face an increased risk because of the leak.

A patch for pcAnywhere 12.5 was released on Tuesday in order to address two security vulnerabilities that could lead to arbitrary code execution or privilege escalation. The flaws were reported privately to Symantec by security researchers Tal Seltzer and Edward Torkington.

“Additional patches are planned for release during the week of January 23 for pcAnywhere 12.0, pcAnywhere 12.1 and pcAnywhere 12.5,” Christine Ewing, director of product marketing for Symantec’s Endpoint Management group, said in a blog post on Tuesday. “Symantec will continue to issue patches as needed until a new version of pcAnywhere that addresses all currently known vulnerabilities is released.”

An attacker could potentially gain remote control of a company’s network and access sensitive information.

A Symantec spokesman said that fewer than 50,000 people used the standalone version of pcAnywhere – although the software was also bundled as part of other security packages.

It suggested that corporate customers who used pcAnywhere for business-critical activity should “understand the current risks” and “apply all relevant patches as they are released, and follow the general security best practices”.

stuart.gilbertson
January 26, 2012
0
Share:

O2 and Tesco Mobile send your phone number to every site you visit using their mobile data network

Lewis Peckover, who set up a little web tool that displays all the “HTTP header information” sent to sites by web browsers, highlighted yesterday that O2 include your mobile phone number whenever you visit a website whilst running over the 3G network.

Users of the social news site, Reddit.com, confirm this problem also happens with Tesco Mobile.

For O2 and Tesco customers browsing on a 3G connection, these headers also include their personal telephone number in an x-up-calling-line-id line. Enterprising website owners can easily keep a copy of the HTTP header information sent over by visiting browsers and tie it to IP addresses and logins, if applicable.

O2 commented on their Twitter feed:

@lewispeckover Hi Lewis. The mobile number in the HTML is linked to how the site determines that your browsing from a mobile device #O2Guru  (https://twitter.com/#!/O2/status/161872584634408960)

But, this is bollocks.  Browsers send a User-Agent line in the Headers that tells web servers what browser and operating system it’s using, rather than having to divulge personal details such as the users mobile telephone number.Customers on an O2 or Tesco Mobile monthly contract might want to talk to a lawyer in regards to the validity of the contract now that it has been seen O2 are willy-nilly giving out these personal details to all websites you visit.

stuart.gilbertson
January 25, 2012
0
Share:

BT recovers from “major business broadband problem”

Edinburgh IT Support company Consider IT reports a few of its clients were left without Internet this morning when BT suffered a major business broadband problem.

BT Business’ Twitter feed said the problem was fixed at 11.30 GMT, and advised users to restart their routers to get connected.

One user of TheRegister.co.uk posts:

Had this this morning.

At first, it was the ADSL Authentication failing on two ADSL2+ lines we have. That went away quite quickly, though, and has been replaced by a completely useless authenticated session that won’t shift traffic at all (literally, even a ping only hears silence). Both lines seem to be the same.

I switched us onto our emergency 3G stick which handles the traffic well for about a day before we hit limits, but the two business ADSL lines are still out of commission.

Shall I demonstrate how reliable BT are as a business provider?

My employers asked me to build a device that can automatically cut the power to the two routers we have, wait 30 seconds and restore power to them (and then restart networking scripts, etc.) at the order of a special text message (coincidentally to the same stick we use for emergency 3G access). It happens that often that our one-and-only VPN user actually “hard-reboots” the routers via text on a regular basis when his VPN software can’t connect.

Our two lines aren’t even stable enough to just run off one most of the time, I had to implement a very fancy failover / connection balancing system using a Linux router to get some sort of stability. Even then, about once a week the local exchange (50 yards away) decides to kill one or more of our sessions and we have to reconnect (via hard power off described above) for no visible reason.

Click here to see the post

The BT Broadband status page reads:

We have recently had a problem affecting Business IP addresses and it may be necessary to reboot your router.

Please power down your router & PC for a minimum of 30 seconds before reconnecting.

Once your router and PC have restarted, attempt to reconnect. We sincerely apologise for any inconvenience.

stuart.gilbertson
January 20, 2012
0
Share:
1 … 5 6 7 … 11
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited