UK cybersecurity cash injection

The current cybersecurity landscape in the UK translates to big money.  How big exactly?  Try £1.9 billion GBP.  That’s how much money Britain’s government has pledged to bring the countries cybersecurity measures to adequate levels over the next five years.  According to Chancellor Philip Hammond, the significant cash injection is much needed and among other things shows people and businesses that Britain is committed to becoming a place where it is safe to conduct their digital business.

Chancellor Hammond had much to say with regards to the UK’s current digital environment.  He, and presumably others within the government know the vast opportunities that technology presents.  However, they temper this optimism with the knowledge that it also carries with it an equally vast amount of risk, believing that such technologies can make corporations and countries vulnerable to outside attack.  But money talks and the economic future of the country is no small matter.  The government wants to make sure that consumers, businesses and investors are presented a trustworthy infrastructure and technology.  Doing so will allow businesses to keep doing business with, and within Britain.

But why need the massive amount of money for cybersecurity anyway?  The answer is simple; the threat is very real.  It is estimated that most major businesses have or will suffer some sort of breach within the next couple of years.  So prevalent is this issue that the official stance on “cyber” is that it is a “tier 1” threat, which is the highest threat level and makes it on par with wars and terrorism.  At this point the government is not just acting because it is a “good thing to do”, but because they are obligated to do something about it, for the good of the country and of the people.

Critics of the cybersecurity budget say that the math just doesn’t add up.  Sure 1.9 billion Pounds sounds like a lot, but spread over 5 years that’s only an operating budget of less than 400 million Pounds per year.  Now contrast that with another tier 1 threat, say terrorism.  To this, the government allocates 3 billion Pounds per year!  This great disparity leaves many to question the Chancellor and the governments plan, and intentions.  If cyberthreat is so great a threat and danger, why then does it not receive the same support as other threats of the same level?

Knowing where to spend the money will be key to the success of the governments goals.  Unfortunately, the details on when or how the funds will be spent were not communicated to the public.  What is known is that very few British companies actually have a plan in place in the event of a cyberattack.  Extrapolating and analyzing data such as this, logic dictates that the government eye the security of IoT (Internet of Things) devices.  Everyone fears an all out server hack, but these seemingly benign endpoints are also points of vulnerability, and often easier to hack.

The simultaneous shut down of botnets would greatly decrease the processing and computing power that attackers can wield.  Likewise, patching and replacing legacy systems will greatly diminish the targets that cybercriminals can attack.  Finally, the government should develop a way to enforce stringent protocols, not only at the federal level, but all the way down to the corporate level as well.  While the 1.9 billion Pounds will definitely help the cybersecurity cause, it will not solve it.

Guest article by Amazing Support

Prevent Joyriding with GPS Vehicle Tracking Devices

In the popular movie Ferris Bueller’s Day Off, three students take off with their dad’s prized vehicle – a 1961 Ferrari convertible.

They drove the expensive car without permission and left it under the supervision of a dodgy parking lot attendant, who then took it out on a second joyriding trip.

If the owner had a reliable GPS vehicle tracking device installed, the joy ride on their valuable sports automobile could have been limited and stopped before too much damage had occurred. The movie on the other hand might not have been quite as funny in that case.

When you possess an automobile or a high performance sports car, you are always at risk because a mechanic, parking valet lot attendant or even a young, less experienced drivers will want to take your car without your permission.

On the off chance that they have access to the keys, and proper supervision of the car is absent, then it could result in impromptu joyrides.

But, here’s a method by which you can stop them…

GPS vehicle tracking devices can be set to automatically notify you when your vehicle has left a specific geographic zone (area).

This may be your work car park, a public car park, the side of the street or even your home garage.

You can set larger temporary zones at a hotel or mechanic’s office allowing them to move the vehicle within that zone without alerting you.

If the vehicle then breaches the zone an automatic notification will be sent to your cell phone with an additional alert sent to a secondary phone of a family member, friend or work colleague.

You will then be able to take action, track your car, and even remotely disable the vehicle’s electronics.

This prevents the joyrider from driving the car further and allows for quick recovery of the vehicle.

You can even remotely sound the alarm, wind up windows or lock the doors! Simply disable the vehicle using your cell phone.

Even if you are in another country as long as you can send and receive SMS text messages you can remotely manage the security of your vehicle.

Depending upon who took the vehicle (if you may know who that was) you can either contact the authorities, towing company or go and recover the vehicle yourself.

In most cases, thanks to the automatic alerts you can get your vehicle back with no or minimal damage.

Of course, with no tracker installed most car owners would not have any idea that their vehicle was being misused.

If in fact the local mechanic or valet misused your vehicle on a joyride then you have proof they did take your vehicle on a journey without your permission.

Don’t risk having your vehicle lost or damaged because of joyriders or impounded due to bad behaviour or speeding by your mechanic, valet or someone else who has access to your vehicle’s keys.

Protect your vehicle asset with GPS vehicle tracking devices and you will be able to monitor your vehicle’s location and prevent its unauthorized use!

The importance of website security

Website’s Security is an ongoing issue and it’s growing as time passes, platforms are becoming more secure but many unexperienced webmasters are also showing up with the Internet’s popularity on the rise and don’t know many of the basic security precautions they should take when developing their website on a web hosting.

The most basic precaution and that has always been suggested is to make regular backups of your site. It’s not uncommon for sites to get hacked into and “defaced” if such a thing happens and you don’t have a backup you may as well say goodbye to your whole website. Make sure to always keep a backup on your computer and not only on your web hosting because your web host may get hacked as well and files can get deleted backups included, if you keep a backup in your personal computer such things are close to impossible unless you get your computer hacked into.

If you’re using WordPress CMS then there’s also 2 basic precautions you should take to ensure 100% safety.

By default wordpress has the admin login page at /wp-admin/ you should change this either manually on your webhosting or get a plugin called “Protect your Admin”. This way no one will know what’s the URL for the admin to login, thus preventing possible brute forcing attacks.

Another important thing is change your Admin username, by default your admin account username is “Admin” you should definitely change this to something else more personal so hackers don’t know which username to brute force into, you may also download the plugin “WordFence” which will tell you if someone tried to bruteforce into your admin account.

For more information visit:

How to protect yourself against email spam?

Email spam is something that almost everyone suffers from and that everyone hates – it ranges from something as harmless as an unwanted sales email about some product that you have never heard of, right through to a scam email that includes an attachment riddled with viruses and tries desperately to convince you that opening that attachment, and infecting your machine, is the right thing to do.

How to prevent spam

Be careful who you give your email address out to

The first and most important thing to understand about email is that your address is precious – don’t give it out to just anyone and everyone, protect it and only give it to people or companies that you trust, and that have a reason to be emailing you as a part of their Email sending campaign.

It is a very simple rule – the more people you give your email address to, the more likely you are to receive spam, eventually. Even though you may think that a company is legitimate and will take care of your address that isn’t always the case.

Unsubscribe where possible

Whenever you do receive an email that you are not interested in receiving always check near the bottom for an unsubscribe link – ALL genuine email senders will include an unsubscribe link that you can click on in order to prevent them from sending you future emails.

How to detect fraudulent emails

So you can’t always stop the spammers from getting to you, but when those spam emails do get through to your inbox make sure you don’t end up getting a virus from them or even worse be defrauded by the senders.

Check the real from address

The first step is checking the from address – sometimes senders of spam will create a fake from address so that it appears as if you know the sender. You can normally find the real email address by double-clicking on the from address itself to show the full email, or you can click on the reply button – because if a spammer is expecting a reply from you they will often show a fake from email to gain your trust but then use another email address that they are monitoring for the reply-to address.

Vet Links

Links are one of the most common ways in which spammers will try and get you on to their system where they can infect you with viruses and so on.

A very common trick is to show a link that appears to be going towards a genuine site but actually is going somewhere else entirely.

A good example is this link that appears to be going to google –, but if you click on the link, you will see that it actually goes to

A very easy way to check these links when they arrive in an email is simply to hover over them – the real destination URL will then be displayed in a “tooltip” window next to your mouse. Even if you cannot determine whether the real URL is safe, if it is very different from the URL of the link text then that is a good indication that there is something suspicious going on.


Attachments are the best way in which a spammer can infect you with a virus or trojan so they should always be treated as suspicious. Spammers can hide viruses in many different types of files including ZIP files, Word and Excel documents and even PDF files.

the best advise when dealing with attachments is to always treat them as suspicious unless you can prove otherwise.

For example, you receive an email that appears to be from FEDEX about a parcel you are waiting for, and it has an attachment – even if you are waiting for a parcel, dont trust that email or the attachment unless you see the shipment number in the email and it matches up with the shipment number you already have on your files – the reason for being so cautious is that spammers intentionally disguise emails as companies that people are often likely to be dealing with and even worse, spammers will sometimes profile their victims before hand and send very targeted emails that will at first appear to be trustworthy.