Tag: security blog
News and information from the Advent IM team.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
Recent revelations have uncovered that spyware applications, such as Spyzie, have compromised the personal data of hundreds of thousands of Android users and thousands of iPhone users. These applications, often termed ‘spouseware’, have been found leaking email addresses, text messages, call logs, photographs, and other sensitive data without the knowledge or consent of the individuals […]
Read MoreThe NIS2 Directive is the EU’s latest and most comprehensive effort to enhance cybersecurity across critical sectors. But with the UK no longer an EU member state, many businesses might assume that NIS2 is irrelevant to them. The reality, however, is very different. Despite Brexit, NIS2 has far-reaching implications for UK organisations, particularly those operating […]
Read MoreFrom Advent IM Commercial Director, Ellie Hurst ASyI Artificial Intelligence (AI) is revolutionising industries across the UK, offering unprecedented opportunities for innovation and efficiency. However, the rapid adoption of AI technologies necessitates a robust Governance, Risk, and Compliance (GRC) framework to navigate the complex landscape of ethical, legal, and operational challenges. The Surge of AI […]
Read MorePhysical security can often be overlooked in all organisations, in favour of cybersecurity. However, some organisations, in particular universities, should not be brushing it under the carpet. In this blog, we’re going to discuss some personal experiences with different university physical security systems and what we can do to improve current measures. University Scenario 1 […]
Read MoreThis article piqued my interest –Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers | WIRED – especially “…privacy experts say they are concerned about the overall lack of transparency and debate about the use of AI in public spaces”. We seem to now be in a world where AI is the […]
Read MoreIn the grand scheme of things, managing a security project can feel like trying to juggle flaming torches while riding a unicycle – entertaining for onlookers, but potentially disastrous for you. Enter the unsung heroes of the digital realm: security consultancy firms. Buckle up for a whimsical ride as we uncover why outsourcing your security […]
Read MoreAre you somebody who leaves their house door unlocked? No? Well then, you need to repeat the same security measures on your computer systems and networks! A backdoor is an undocumented way of gaining access to a computer system or process specifically installed on a system to compromise software at a later date. A backdoor […]
Read More