For a 6th consecutive year Foursys, along with selected partners, are holding free cyber security conferences up and down the country throughout the month of May.
At Foursys we are seeing a real increase in requests from customers who need help improving their weakest security link. Their end-users. So we thought why not compile a free toolkit focusing on the ten most crucial topics for end-users to get clued up on.
The Internet of Things (IoT) is changing all elements of our lives as we know it. Business is no exception to this. Here are 7 ways in which Forbes suggest IoT will change business for you in the not so distant future. So if you're not currently ready for the IoT changes coming in 2017, here's a head start on the impact IoT and it's devices will have on your business over the next 12 months.
This week the guys at Promon taught us how to hack a Tesla car in two-minutes. We look at this video and comment on how easy it really is and the security levels Tesla, and other app developers, need to go to, to ensure their users are safe from such basic hacks.
A couple of clever guys from a Norwegian based security research firm called Promon have managed to hack a Tesla through a bit of social engineering and readily available malware on the car owner’s mobile device.