Home Tags Cybersecurity

Cybersecurity Related Content

Person posting vote

How to prevent cyber attackers’ manipulation of the democratic process

With GCHQ's recent warning that voting was subject to a cyber attack, what can we do to avoid manipulation of the democratic process?
White male hacker sitting in dark room listening into people's calls

Hermit Spyware: Who discovered it and why is it dangerous?

Open Access Government interviews Justin Albrecht, the man behind the discovery of Hermit Spyware in Italy and Kazakhstan.
Futuristic Data center. Big Data analytics platform. Quantum processor in the global computers network

The road to quantum-enabled cybersecurity

Dr Francis Gaffney, Senior Director – Mimecast Labs & Future Operations at Mimecast, charts the road to quantum-enabled cybersecurity.
Black screen with colourful font data, programme code hacking

Cyber security threats on the rise: how should organisations react

Organisations face the growing risk of becoming victims of cyber security threats - what can they do to avoid them?
cyber security concept in a business

An increase in cyber attack fines highlights firms’ need to tighten security

One in five companies that has been the victim of a cyber attack has felt the increased financial impact of a substantial cyber attack fine.
Man in dark room suggestive of cyber attack

Why we need a cyber-resilient public sector

With UK councils targeted with an average of 10,000 cyberattacks every day, building a cyber-resilient public sector is becoming ever more important.
Abstract futuristic cyberspace with binary code, matrix background with digits

Cybercrime is on the rise, is your business prepared?

Richard Andreae, CEO of SupPortal UK Ltd discusses cybercrime threats and how to efficiently protect your business with cyber security.
Group of people walking down street with faces blurred

How to shore up data protection beyond cyber security policies and standards

Jon Fielding, Managing Director EMEA Apricorn, discusses the need to focus on information and data protection whilst tackling the critical 'human factor' in breach prevention, backup and recovery strategies.
cyber essentials

Get ahead of the deadline to be Cyber Essentials Certified

David Nicholls, Managing Director at Better-IT Ltd, discusses Cyber Essentials and how to become certified to protect your organisation, no matter the size.
Security lock symbol on computer circuit board

Finance, foes and failure: The risks of neglecting data governance

Data governance is a buzzword that we hear thrown around a lot, especially since the implementation of GDPR back in 2018.
Hacker working on computer cyber crime

October is Cybersecurity Awareness Month: Are you prepared?

Martin Roots, Managing Director at the Expede Group, discusses cybersecurity awareness, walking us through different cyber attacks and how to prevent them efficiently.
Woman unlocks phone with her finger print

Is it time for the death of the password?

In this podcast, Open Access Government speaks with Patrick McBride on how to best protect your data online and whether it's time to go passwordless.
concept of a digital city and cyber space

The dawn of a cyber-physical internet

Philip Young, Director of Policy, Research & Strategic Engagement, Digital Catapult, argues that we’re at the dawn of a cyber-physical internet. Governments globally must lead the way, he says.
Two businessmen in government sat round laptop discussing real time data on screen

Why government must heed real-time data management trends

Real-time data is the lynchpin for any progressive government, enabling it to improve efficiency, enhance operations and communications, provide improved services for citizens, uncover fraud and lower the risk of cyberattacks.

Hybrid working is here to stay – now secure your workforce

The rise of hybrid working has enabled greater flexibility for employees, laying bare a wealth of opportunities for organisations.
software coding on a computer screen, open-source software

Open-Source Software: An introduction

Samuel Leach, Director of Samuel & Co Trading, provides a helpful introduction to the world of Open-Source Software.
Computer Security Cyber Attack by Toy Soldiers

Protecting against cyber threats from nation states

Looking at the cyber threats posed by nation states, organisations must assess their own risk and prioritise defences against them accordingly.
Laptop keyboard with green key reading 'Critical National Infrastructure'

Cyber risk: how secure is our critical infrastructure?

We can’t be complacent about cybersecurity threats to critical national infrastructure - every organisation must play a part in protecting it.
Blurred image showing man working in dark room

Escalating supply chain cyber-attacks need a strategic response

Stuart Jubb, Group Managing Director at Crossword Cybersecurity, outlines the need for a more strategic and collaborative approach to maintain visibility of supply chain attack threats.
cyber security internet and networking concept

CyberCX added as a supplier on Crown Commercial Service

CyberCX has been named as a supplier on Crown Commercial Service (CCS) Cyber Security Services 3 to support the public sector.

Follow Open Access Government