Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter

We have been CE & CE+ Certified Body since 2017.

Cyber Essentials+

A useful archive of security and information protection articles.

2011

Data loss: why staff using web and email poses greatest risk

Hackers excel in cyber attack on security firm, RSA

iPhone smarting from Google's Android phone hit

What can you do at no cost to reduce your IT security risks?

Security tech tips - optimising your SEP investment

Microsoft and Adobe join forces on security

Are we too lazy to be trusted with passwords?

UK workers say they would breach security

Government helps SMEs with cyber security

What is hacking for dummies?

Keep control over mobile devices in the office

"Indestructible" botnet discovered

Security tech tips: optimising your SEP investment

Are you the weakest security link?

9-character passwords no longer secure?

US reacts to Lockheed Martin attack

Security tech tips – a sneak peek at Symantec Endpoint Protection

A simple guide to remembering complex passwords

UK comes top in recent European security study

Biggest security threat comes from mobile devices

Security Tech Tips - Maximising the investment

Data Encryption - the dangers of unprotected-data

No news is good news for malware

Security tips optimising SEP investment

What is email encryption and why do you need it?

Government spook warns of cyber threats to SMEs

Microsoft takes wraps off Windows 8

Is IT consumerism a curse or blessing in disguise?

What is the importance of data over hardware?

Google Wallet to pocket the cash?

Internet security: don't believe everything you read

Management of smartphones and tablets

Keep your data private on public Wi-Fi

 

2012

Phishers using new hooks to reel us in

Top firms unaware of security leaks

One in five spam emails wiped out

Is your cloud security safe?

What is polymorphic malware

A whisker from disaster. No, not you Santa

What is disaster recovery

Domain hijacking on the rise

best form of cyber security is attack

What is hacktivism

Stop and counteract targeted cyber attacks

Expose router security weakness

How to deny hackers

How we feel about online privacy

Ronaldo named top scorer in cyber threats

WMware - are all your eggs in one basket?

5 steps to greater Windows security

Rise of the 'anywhere employee'

Whats is the Flame virus

Biblical passwords harder to crack

Advanced Persistent Threat (APT) and cyber threats

Microsoft makes security paramount

Court case highlights need for robust web security

Beware Linkedin email scam

Keeping details private on mobile devices

Ensure security questions are Google-proof

How to avoid viruses on mobiles and tablets

Security Tech Tips - Maximising the investment

 

2013

Largest ever cyber attack

Report finds data theft by staff on the rise

Using signed digital certs with SEP

keep passwords safe from cyber criminals

Safe online Christmas shopping

zero-day exploit affecting XP and Server 2003

Download safely

Symantec Endpoint Protection (SEP)

Tips for iPad security

Social media: The potentials and pitfalls

Stay secure in Adobe

Microsoft becomes latest hacking victim

The days of the password are gone

BlackBerry takes swipe at Android security

Cyber attacks on SMEs: Prevention cheaper than cure

Urban myths surrounding malware

What is ransomware?

Information security: a suggestion for how to start your year

SMS spam more dangerous than email spam

Android the target of 79% of mobile malware

Does Office 365 cloud need you?

Gesture-based passwords security

 

2014

ISTR 2014 (Internet Security Threat Report)

Is your Active Directory healthy?

Snapchat hacked

Surge in cyber attacks

What is two-factor authentication?

Users don't know bots from worms

Microsoft improves security for Outlook and OneDrive

How to keep your website safe

Bitcoin exchange theft

Router hijacks signal technological evolution

What is Sharepoint, NAS and Exchange?

New cyber response team boosts UK security

Advanced Persistent Threats - cyber security risk

Heartbleed

Ordering malware from Amazon

The celebrity hacking scandal: how safe is your data?

Mozilla leaks thousands of emails and passwords

 

2015

Cyber criminals increasingly targeting cloud services

Malicious extensions bad news for Google users

Ashley Madison hack 'inside job'

Invisible ads destroy battery life and mobile data

How do hackers steal our passwords?

Facebook word cloud app could be data security minefield

Millions of Android devices infected by popular apps

Cyber insurance for businesses

IT Security Solutions – What's new?

Lizard Squad DDoS attack

Apple malware 'undetectable and unremoveable'

Hacks cost UK businesses £1.46 million

6 types of hacker revealed

Security improvements for iOS 9

How secure is the cloud?

Lenovo victim of cyber attack

Freak flaw puts encrypted data at risk

Apple discovers major App Store breach

TalkTalk cyber attack fiasco

Cybe -criminals target businesses with 'whale' scam

HP finds all smartwatches vulnerable to attack

Your life online is public

 

2016

Scandalous security flaws at heart of Panama leak

Ransomware works – that's why criminals to use it

Hack cost TalkTalk £60 million and 101,000 customers

Zero-Day Warning! Ransomware targets Microsoft Office 365 Users

what happens when Cyber Attack is missed

Microsoft to notify victims of government hacks

How to reduce your reliance on passwords

The biggest security breaches

Prepare for more cybercrime after Brexit

Top tips for tightening phone security

Huge surge in Android ransomware attacks

Cybercriminals target UK bank accounts

'Advanced and nasty' Android malware discovered

Lincolnshire council cyber-breach