0161 726 5997 Info@FoxSecurity.co.uk
Windows 10 Privacy Update

Windows 10 Privacy Update

It’s been close to 18 months since the arrival of Windows 10.  In that time, Microsoft has (deservedly) received endless criticism to the new OS’s approach to user privacy. Not much has changed since the release, with Microsoft sticking to its original policy...
The Surprising New Ransomware Targets

The Surprising New Ransomware Targets

Ransomware has been hitting the cybersecurity headlines throughout the last year, and it shows no sign of slowing down.  The latest varients are now targeting a number of remarkable victims, and demanding huge patments to unlock the encrypted data. So what are these...
Questions Around BYOD (Bring Your Own Device)

Questions Around BYOD (Bring Your Own Device)

It’d been a number of years since the initiative of Bring Your Own Device became a hot topic in the cybersecurity world.  I’ve worked with companies around the Manchester and Liverpool areas for some years, and the popularity seems to have now peaked.  In...
Risks of USB Memory Sticks

Risks of USB Memory Sticks

USB sticks are everywhere.  They’ve been with us for a long time now.  They’re portable, convenient, and one of the most consistent security weakpoints for businesses for more than a decade. USB drives are handy rewritable memory devices that are great for...
Is AntiVirus Still Alive in 2017?

Is AntiVirus Still Alive in 2017?

With Ransomware attacks hitting the news on an almost daily basis, the question has to be asked – why isn’t antivirus working anymore? It seems that the answer given doesn’t feel like a satisfactory explanation – standard AV detection works on the decades old approach...
Shadow IT – What’s The Risk?

Shadow IT – What’s The Risk?

As the internet has grown, so have the number of incredibly useful services.  Some of these services are providing functionality that internal IT departments don’t yet offer, and many employees are setting up accounts with online document sharing sites, CRM...
What Are Security Vulnerabilities?

What Are Security Vulnerabilities?

Your business operates online.  Whether it’s just for email, a simple website, or a full-featured application that your customers access, it all relies on connections to the wild-west of the internet. Security vulnerabilities are weaknesses in the system.  The...
Ransomware for Christmas

Ransomware for Christmas

The latest twist in the ransomware story has come as an unwanted early Christmas present for some. “Popcorn Time” is the latest variant of the file-encrypting malware, but the difference with this one is that it gives an option for those who don’t want to pay the...

Phishing – How To Get Off The Hook

What is phishing? It’s a effort to glean sensitive information from a target, often for a malicious reason, such as to enable fraud or unauthorised systems access.  Usually the information that is sought contains passwords, or credit card details.  It’s...