Skip to content
Halkyn Security Blog
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us
Menu Close
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us

Specialist Security & Risk Management Consultants

Read more about the article UOC – Cybersecurity Conference 2017
UOC Cyber Security Conference 2017

UOC – Cybersecurity Conference 2017

  • Post author:Halkyn Security
  • Post published:23 March 2017
  • Post category:Security/Security News

Cybersecurity is big news with governments and businesses suffering at the hands of cyber attacks. As a result of this, the University of Chester (UoC) STEMs society is hosting a Cybersecurity…

Continue ReadingUOC – Cybersecurity Conference 2017
Read more about the article Dashboards vs Security – are they really helping?
Example Security Dashboards

Dashboards vs Security – are they really helping?

  • Post author:Halkyn Security
  • Post published:20 March 2017
  • Post category:Security/Security Risk Management

Metrics, Dashboards and Security Like them or not, metrics are a fundamental part of every organisation. Security doesn't get to a free pass. It is a rare CISO who doesn't demand…

Continue ReadingDashboards vs Security – are they really helping?
Read more about the article Security Incident Response Really Does Matter
Hacked? Time for incident response...

Security Incident Response Really Does Matter

  • Post author:Halkyn Security
  • Post published:8 March 2017
  • Post category:Security/Security Risk Management

Incident response is one of those things you really hope you'll never have to use, but know you will. Or at least you should know! Even with the best security, there…

Continue ReadingSecurity Incident Response Really Does Matter
Read more about the article North Wales Cyber Security Cluster – April 2016 Meeting
Cyber Security Cluster - April 2016 meeting

North Wales Cyber Security Cluster – April 2016 Meeting

  • Post author:Halkyn Security
  • Post published:18 April 2016
  • Post category:Company News/Security/Security Education and Awareness

The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn…

Continue ReadingNorth Wales Cyber Security Cluster – April 2016 Meeting
Read more about the article Ransomware: Don’t panic – deal with it
Ransomware bites hard but good security controls are effective

Ransomware: Don’t panic – deal with it

  • Post author:Halkyn Security
  • Post published:22 March 2016
  • Post category:Security

Since Cryptolocker appeared in late 2013, it seems hardly a day can go by without some ransomware attack hitting the news. The variations all have entertaining names like Teslacrypt, Locky,…

Continue ReadingRansomware: Don’t panic – deal with it
Read more about the article Cyber Essentials – Would it have saved Lincolnshire County Council?
Lincolnshire County Council - Hit by ransomware Jan 2016

Cyber Essentials – Would it have saved Lincolnshire County Council?

  • Post author:Halkyn Security
  • Post published:1 February 2016
  • Post category:Security

Cyber Essentials is a UK Government driven scheme which is designed to help businesses of all size reduce the risk and impact from malware attacks. It is mandatory for those…

Continue ReadingCyber Essentials – Would it have saved Lincolnshire County Council?
Read more about the article 3 essential elements of any Infosec function
Infosec - its a team sport

3 essential elements of any Infosec function

  • Post author:Halkyn Security
  • Post published:8 January 2016
  • Post category:Security

As the news often shows, Information Security (infosec) is a big part of any organisation. From the small business with just a couple of computers to the global enterprise, infosec…

Continue Reading3 essential elements of any Infosec function
Read more about the article Incident Response – 5 key stakeholder groups
Incident Response - Your team cant function in a vacuum.

Incident Response – 5 key stakeholder groups

  • Post author:Halkyn Security
  • Post published:7 December 2015
  • Post category:Security News

Incident response is a vital component of every organisations security. It provides the safety net for when the inevitable happens and other controls fail. A good incident response team will…

Continue ReadingIncident Response – 5 key stakeholder groups
Read more about the article Halkyn Consulting – Site Redesign / Cyber Security Cluster
The new Halkyn Consulting Security Services website

Halkyn Consulting – Site Redesign / Cyber Security Cluster

  • Post author:Halkyn Security
  • Post published:22 November 2015
  • Post category:Company News

As you may have noticed, the Halkyn Consulting website has undergone a redesign. This is aimed to improve our responsiveness on multiple platforms, allow us to expand our services without…

Continue ReadingHalkyn Consulting – Site Redesign / Cyber Security Cluster
Read more about the article AV is not dead – it just has limits
AV is not dead, just understand what it can and cant do.

AV is not dead – it just has limits

  • Post author:Halkyn Security
  • Post published:26 October 2015
  • Post category:Security

Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that…

Continue ReadingAV is not dead – it just has limits
Read more about the article Supplier Security – A lesson for T-Mobile
Supplier security problems result in this notice from the CEO of T-Mobile

Supplier Security – A lesson for T-Mobile

  • Post author:Halkyn Security
  • Post published:3 October 2015
  • Post category:Security

Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, "doing something" about…

Continue ReadingSupplier Security – A lesson for T-Mobile
Read more about the article Phishing and Malware – FedEx missed delivery
FedEx Delivery Phishing Email

Phishing and Malware – FedEx missed delivery

  • Post author:Halkyn Security
  • Post published:8 September 2015
  • Post category:Security/Security News

It seems that every day, new script kiddies discover the likes of the Social Engineering Toolkit or Metasploit and launch a new wave of phishing attacks. Unfortunately it seems that…

Continue ReadingPhishing and Malware – FedEx missed delivery
Read more about the article Finphishing – 8 steps to criminal profits
FinPhishing - short and succinct message, simple to generate but potentially deadly to the victim.

Finphishing – 8 steps to criminal profits

  • Post author:Halkyn Security
  • Post published:28 August 2015
  • Post category:Security/Security News

FinPhishing - or financial spear phishing - is a form of social engineering attack which is becoming massively profitable for the criminal enterprises involved. Unfortunately for the victims it is…

Continue ReadingFinphishing – 8 steps to criminal profits
Read more about the article Security breaches – do you know what to do next?
Anonymous - often linked to security breaches

Security breaches – do you know what to do next?

  • Post author:Halkyn Security
  • Post published:22 July 2015
  • Post category:Security/Security Risk Management

One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to…

Continue ReadingSecurity breaches – do you know what to do next?
Read more about the article Halkyn Consulting – Vacation and Course Period

Halkyn Consulting – Vacation and Course Period

  • Post author:Halkyn Security
  • Post published:15 May 2015
  • Post category:Company News

As our existing clients may be aware, Halkyn Consulting has entered into a three week period where we maximise our courses and vacation time. During this period we will be…

Continue ReadingHalkyn Consulting – Vacation and Course Period
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 12
  • Go to the next page

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Halkyn Security Tags

Anti Terrorism Asset Protection Breach Business Protection Cloud Computing Company News Compliance Crime Cyber Security Cybersecurity Data Protection DFIR Downloads DPA Encryption European Union Data Protection Financial Government Hacking Halkyn Security Consultants Home Security ICO Identity Management Identity Protection Incident Response Information Security Internet Loss Prevention NHS Office Security Passwords Phishing Physical Security PICERL Risk Management Security Security Awareness Training security education and awareness Security Management Security News Security Risk Management Security Services Security Training Truecrypt Vulnerabilities
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Calendar

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Nov    

Halkyn Security Posts

  • DFIR on a Shoestring – Incident response for less
  • Linux DFIR: Workflow for a busy responder
  • Linux Incident Response Guide
  • Incident Response Phases – Lessons Learned
  • Incident Response Phases – Recovery
  • Incident Response Phases – Eradication
  • Incident Response Phases – Containment
  • Incident Response Phases – Identification
  • Incident Response Phases – Preparation
  • Incident Response – Process Matters

Follow Us

  • Twitter
Copyright - OceanWP Theme by OceanWP