Regency ISO27001 Certified Again

We are again extremely pleased to announce that, as of 12th April 2018, Regency IT Consulting maintained its ISO/IEC 27001:2013 certification for another year. Continue reading “Regency ISO27001 Certified Again”

Why Cyber Security is the New Health & Safety for Industrial Control Systems

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings.  Continue reading “Why Cyber Security is the New Health & Safety for Industrial Control Systems”

The Rise of the Botnets – don’t be a victim

The Rise of the Botnets – don’t be a victim

The UK National Trading Standards agency (NTS) have released a report detailing the risks to consumers around the new trend for smart and connected devices around the house. These are becoming more prevalent in many everyday devices, for example, TVs, fridges, lights, thermostats and voice-activated home assistants. They are often referred to as Internet of Things, or IoT.
Continue reading “The Rise of the Botnets – don’t be a victim”

Cyber Security – Where’s The Risk?

In a series of blogs, David Sylvester – Senior OT Security Consultant, asks whether senior executives really understand the nature of the cyber security risk to their business, and whether they are doing enough to reduce the potential impact of an attack.

Cyber Security – Where’s the risk?

Continue reading “Cyber Security – Where’s The Risk?”

Ransomware & Industrial Control Systems: Never the twain shall meet – until now!

If ransomware infects and encrypts a device you might swap it out for another device, but Andrew Cooke explains, if HMI devices get infected, unplugging equipment isn’t always feasible, so the critical thing has to be prevention.
Continue reading “Ransomware & Industrial Control Systems: Never the twain shall meet – until now!”

Reviews and Reputation

It’s as old as the hills – from market stalls in ancient Greece to online shops, the technique of drumming up business by getting people to pretend to buy goods in order to encourage others to buy these goods. Or paying people to bad mouth the competition and to rave about certain products. Continue reading “Reviews and Reputation”

Another Targeted Malware Attack

It has been widely reported that the popular system optimisation tool CCleaner has been the subject of a security breach where the download servers were hacked and rogue software was embedded into the distributable file. Continue reading “Another Targeted Malware Attack”

Cyber Security for Connected and Automated Vehicles

We are hearing in the news more and more stories that the next generation of connected and autonomous vehicles are right around the corner. The benefits these vehicles could bring to society are very attractive – greater economy; increased safety; reductions in congestion are just a few of the things we could look forward to. Continue reading “Cyber Security for Connected and Automated Vehicles”

When did you last weed your data

Are you a hoarder? Many people are, whether they realise it or not. They tend to save things because they might come in useful or for sentimental reasons or because they simply don’t notice the volume of things they’ve gathered over the years. Continue reading “When did you last weed your data”

Fighting online brand infringements

It’s not news that the buying and selling of counterfeit goods online is big business. The Organisation for Economic Co-operation and Development reported in 2016 that fake goods made up around 5% of all global trade equating to a total value of $461bn. Counterfeiters attracted almost half the visits to the their websites compared to the visits to legitimate brand sites, and multinational manufacturers lose roughly 10% of their revenue to these traders. Continue reading “Fighting online brand infringements”

Industroyer: Are the lights about to go out?

The SANS Institute recently published a technical report (link) analysing the December 2016 Ukrainian power system attack. The malware identified is known as ‘Industroyer’ or ‘CrashOverride’ Continue reading “Industroyer: Are the lights about to go out?”

Recent spate of Ransomware – second order effects

You may be fully cognisant of the recent impacts of WannaCry(pt) and NotPetya; effects to capability/output and reputational damage of a number of functional business areas, undoubtedly leading to a degree of financial impact. Continue reading “Recent spate of Ransomware – second order effects”