Blog
Who Regulates the Data Protection Act?
Who Regulates the Data Protection Act? Data Protection Blog by Information Security Awareness Training provider Hut Six Security
InfoSec Round-Up: June 19th 2020 - Hut Six
Dating App Leak, Norwegian Tracing App and Security Camera Flaw – Infosec Round-Up, June 19th, 2020
NHS Email Accounts Compromised in Phishing Attack
NHS phishing attack sees email accounts compromised as part of an attack targeting a wide range of organisations Blog by Hut Six Security.
Who Enforces the Data Protection Act?
Who Enforces the Data Protection Act? Principles, Protections and Penalties. Blog by Information Security Awareness Training provider Hut Six Security.
InfoSec Round-Up: June 12th 2020 - Hut Six
Tax Refund Scams, Zoom Encryption and Fake Ransomware Decryptor – Infosec Round-Up, June 12th, 2020
How Secure is Your Password Process?
How Secure is your Password Process? Password security blog from Information Security Awareness Training provider Hut Six Security.
Who Does the Data Protection Act Apply To?
Who Does the Data Protection Act Apply to? Blog by Information Security Awareness Training and phishing simulator provider Hut Six Security
InfoSec Round-Up: June 5th 2020 - Hut Six
REvil Ransomware, Apple Bug Bounty & UK Gov Contact Tracing – Infosec Round-Up, June 5th 2020
Why Social Engineering Works
What Social Engineering Methods do attackers use to get your personal information? Blog by Information Security Awareness Training provider Hut Six Security
What Year Was the Data Protection Act Introduced?
What Year Was the Data Protection Act Introduced? - 2018, however it has seen some changes as enforcements have increased.
InfoSec Round-Up: May 29th 2020 - Hut Six
GitLab Phishing, Red Cross Cybersecurity, and easyJet Lawsuit - Infosec Round Up, May 29th 2020
How Does the Data Protection Act Protect your Rights?
How Does the Data Protection Act Protect your Rights? Blog by information security awareness training provider Hut Six Security.
How a Ransomware Attack Works
Knowing how a ransomware attack works is the key to avoiding them and the damage they can pose to your organisation. Blog by Hut Six Security.
Hut Six Staff Snippets: Handling Sensitive Information - Hut Six
Luke talks about his favourite Information Security tutorial, Handling Sensitive Information. Information Security video by Hut Six Security.
InfoSec Round-Up: May 22nd 2020 - Hut Six
Cryptomining hijack, EasyJet Hack and NHS Failing audits - InfoSec Round-Up, May 22nd 2020