Discovering managed, cloud-based next-generation cybersecurity

Cloud computing is commonplace within the public sector, but have you considered the benefits of using cloud-based security to protect the perimeter...

Whose role is it to tackle cyber security?

I am sure you’ve noticed that the threats to online security are constantly evolving, and have become increasingly sophisticated. At Intercity, we...

5 Minutes with Andy Smith, Intercity Security Operations Centre Manager (‘ISOC’)

Tell us what your role is, and what team you work on…

As the ISOC manager it’s my team that look after annuity services on a 24 hours per day, 7 days...

Gone phishing – Why Android and iPhone users are susceptible to cyber phishing scams

We use our mobiles for everything. From arranging dinner dates to replying to work emails to ordering flowers and even catching up on our favourite...

How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...

How do signature-based attacks work?

Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...

How do firewalls work?

Firewalls are something we take for granted, but as we've seen from some recent high profile security breaches, even the best firewalls are...

Security matters: The role of IT resellers

Whether you're an enterprise or a SME, your focus is on growing your business on a day-to-day basis, scaling up, and bringing the right people on...

The road to ‘security hell’ Is it paved with good intentions?

One thing is certain - no business is safe from a cyber-attack. Most organisations will state that as we move to the midpoint of 2018, cybersecurity...