Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter

Latest Headlines

Director Update

» 9/6/2023 - Utilising the security functions and policy options in Azure and M365

» 9/3/2023 - Protect your network with the Cyber Security Assessment Tool

» 8/31/2023 - KnowBe4 QR Code Phishing Test & 2023 Benchmark Report

» 4/15/2023 - Demystifying Microsoft Security - MS Security Symposium Registration

» 3/26/2023 - Microsoft 365 for Secure Hybrid Work

» 6/30/2022 - We have relocated to Lloyd's Avenue, London

» 10/11/2021 - Addressing the most common cyber security issues and threats

» 4/29/2020 - Covid-19: How to keep your business safe during the lockdown

» 4/20/2020 - Phishing Awareness Training session

» 4/20/2020 - Cyber Security and Covid-19: How can CST help?

» 3/18/2020 - Pulse Connect Secure Solution - Enabling business continuity in times of crisis

» 12/4/2019 - The Equifax Breach Timeline: What happened, how did it happen, and what happens next?

» 11/11/2019 - Protect data and stop threats with McAfee

» 10/8/2019 - IASME chosen to be the sole Cyber Essentials Scheme partner

» 8/26/2019 - How Cyber-Savvy are your staff?

» 8/12/2019 - Instructor delivered Cyber Security Awareness Training

» 8/1/2019 - CST Limited Acquires Cellar Systems

» 7/18/2019 - Securing Office 365 – Who’s to blame when a breach occurs?

» 7/2/2019 - Symantec’s Internet Security Threat Report 2019 – Key Findings

» 7/2/2019 - Spam and Phishing Threats in Q1 2019 - Tinder, Instagram & Apple

» 6/2/2019 - 10 Reasons to Upgrade Your Check Point Firewall

» 2/11/2019 - Symantec Security.cloud now available as a managed service with CST

» 1/28/2019 - Cyber Security User Awareness Training Event

» 9/18/2018 - How do you get the Board on-board for cyber defence?

» 9/18/2018 - A question of security standards

» 7/15/2018 - The top 10 data security measures you should adopt now

» 5/10/2018 - Government Report Highlights Alarming Number of Businesses Affected by a Data Breach

» 4/17/2018 - GDPR is Almost Upon Us! Register to our Webinar Now!

» 4/11/2018 - Are You 100% Sure What’s Involved in GDPR Compliance?

» 4/11/2018 - Secure Your Valuable Data Against Loss

» 3/27/2018 - Out of Hours Security Attacks – Be The First To Know

» 2/21/2018 - DLP: What Does It Mean to You?

» 2/15/2018 - Reduce Your Cyber Exposure Gap

» 1/29/2018 - 2017; Seven of the Most Prolific Data Breaches & Cyber Incidents the UK

» 1/11/2018 - GDPR: A Necessity with New Requirements

» 12/5/2017 - Investigation: WannaCry cyber attack and the NHS

» 11/28/2017 - Cyber Defence and Information Protection Best Practice Workshops – Available Now!

» 11/26/2017 - Nessus Professional v7

» 11/9/2017 - Experience the Power of Security Intelligence - Join us for our LogRhythm Explore Event

» 10/30/2017 - The anatomy of a privileged account hack and how to reduce risk

» 10/12/2017 - Highlights from the Symantec Internet Security Threat Report 2017

» 10/9/2017 - IASME and Sutcliffe & Co hit key landmark in cyber insurance

» 8/1/2017 - Symantec acquires Bluecoat, Fireglass and Skycure!

» 8/1/2017 - What are cyber security threats? (in under 3 minutes)

» 7/19/2017 - Are you confused by GDPR? Get the facts with our FAQ.

» 6/25/2017 - Cyber Security: Shaken Not Stirred

» 6/25/2017 - Your complete guide to Privileged Account Management

» 6/18/2017 - Symantec Consultancy and Professional Services

» 6/18/2017 - Free 30-day webroot Endpoint Protection trial

» 6/1/2017 - What is Ransomware?

» 5/4/2017 - A great reason to have regular Pen tests and vulnerability scanning

» 5/4/2017 - Hacking attacks on UK businesses cost investors £42bn

» 3/17/2017 - Cyber-threat to UK business is 'significant and growing'

» 2/6/2017 - Want higher IT productivity? Get better backup and disaster recovery

» 1/12/2017 - 10 Signs You Need To Rethink Your Backup and Recovery Strategy

» 12/12/2016 - Exploit kits take Cyber attacks to the masses: but they’re preventable

» 11/11/2016 - UK must be capable of retaliating against cyber attacks

» 11/11/2016 - Yahoo! facing class-action lawsuit following serious security breach

» 10/13/2016 - CST News: The Cyber Defence Edition

» 9/12/2016 - Prove your cyber security best practice to your customers

» 7/26/2016 - IT Security Solution Webinars - what’s on?

» 7/26/2016 - CEO fired – what happens when Cyber Attack is missed

» 7/26/2016 - CryptoHitman fix and 'Zero-Day Warning!' ransomware targets Microsoft Office 365 Users

» 7/26/2016 - Euros edition - latest security news

» 9/28/2015 - Cyber security webex - join us for an hour

» 9/28/2015 - Assume everything you do and say will be made public

» 9/28/2015 - HP finds all smartwatches vulnerable to attack

» 9/28/2015 - Latest October Internet security news

» 9/15/2015 - New Clearswift solutions available

» 8/12/2015 - MS Exchange Server support end of life December

» 8/2/2015 - Security improvements lead the way in iOS 9

» 4/30/2015 - IT security showcase virtual seminar - new dates!

» 4/29/2015 - IT Security Solutions – What’s new?

» 2/1/2015 - Windows Server 2003 migration - are you ready?

» 9/18/2014 - Mozilla leaks thousands of developers’ emails and passwords

» 9/18/2014 - Cyber security webex - 4th November

» 5/18/2014 - IT security study awards CST highest rating

» 5/18/2014 - Symantec launches Protection Engine for NAS

» 5/18/2014 - IT security study awards CST highest rating

» 12/10/2013 - Symantec Endpoint Protection – it is time to upgrade!

» 11/11/2013 - CST awarded Symantec IT Risk & Compliance specialisation

» 9/27/2012 - Symantec Security Partner Award

» 9/6/2011 - CST becomes first Symantec partner to achieve 'Master Specialisation'

» 3/20/2009 - CST awarded Symantec Technical Assistance Partner Program (TAPP)

Security & Industry News

Industry

» 7/27/2016 - Huge surge in Android ransomware attacks

» 7/27/2016 - Brexit edition - security news update from CST

» 7/27/2016 - ‘Prepare for more cybercrime after Brexit’, experts warn

» 7/27/2016 - Top tips for tightening your phone security

» 5/15/2016 - Ransomware works – that’s why criminals to use it

» 5/15/2016 - Royal birthday edition - CST newsletter

» 5/15/2016 - Hack cost TalkTalk £60 million and 101,000 customers

» 5/15/2016 - Scandalous security flaws at heart of Panama leak

» 3/29/2016 - Cyber criminals target UK bank accounts

» 3/29/2016 - Hatch a plan with us - CST newsletter

» 3/29/2016 - 'Advanced and nasty' Android malware discovered

» 3/29/2016 - Lincolnshire council cyber-breach a lesson for all

» 12/14/2015 - December IT security news update

» 12/14/2015 - Facebook word cloud app could be data security minefield

» 12/14/2015 - Cyber Security Showcase

» 11/26/2015 - CST security news and seminars

» 11/26/2015 - TalkTalk communication fiasco

» 11/26/2015 - Cyber-criminals target big businesses with ‘whale’ scam

» 8/25/2015 - 'Invisible ads' destroy battery life & use mobile data

» 8/25/2015 - Ashley Madison hack an ‘inside job’

» 8/24/2015 - How do hackers steal our passwords?

» 8/23/2015 - Latest Internet security news roundup

» 8/2/2015 - Hacks could cost UK businesses £1.46 million

» 8/2/2015 - The six types of hacker revealed

» 8/2/2015 - CST July news and security round up

» 4/30/2015 - April cyber security newsletter

» 4/30/2015 - Bad extensions spell bad news for Google users

» 4/30/2015 - Cyber criminals increasingly targeting cloud services

» 4/29/2015 - Cyber and IT security news business update

» 4/29/2015 - Millions of Android devices ‘infected’ by popular apps

» 4/29/2015 - How important is cyber-insurance for businesses?

» 2/2/2015 - January security monthly news

» 2/2/2015 - Windows 2003 is dead - Are you ready: Securing an un-supported OS

» 2/2/2015 - Lizard Squad ruins Christmas with DDoS attack

» 2/2/2015 - Apple malware ‘undetectable and unremoveable’

» 11/9/2014 - Cyber security defence strategy

» 9/18/2014 - September CST security news

» 9/18/2014 - Celebrity hacking scandal: how safe is your data?

» 7/7/2014 - Keep your website safe - download web security guide

» 6/20/2014 - How to eliminate all vulnerabilities across all applications

» 5/26/2014 - Advanced Persistent Threats - cyber security risk

» 5/26/2014 - Heartbleed: what to do next

» 5/18/2014 - Cyber attacks - coming to a business near you!

» 5/1/2014 - New cyber response team boosts UK security

» 5/1/2014 - Security news and information newsletter

» 4/30/2014 - Reality versus hype - what is really happening?

» 4/30/2014 - The latest news on internet security

» 4/14/2014 - Bitcoin exchange searching for culprits after theft

» 4/14/2014 - April CST security news update

» 4/14/2014 - Router hijacks signal technological evolution

» 4/14/2014 - What links rats to Sharepoint, NAS and Exchange?

» 3/4/2014 - What is two-factor authentication?

» 3/1/2014 - Snapchat hacked

» 3/1/2014 - CST security news & updates

» 1/4/2014 - January CST security newsletter

» 12/15/2013 - XP bug reminds users of threats to come

» 12/15/2013 - One cracker to avoid this season

» 12/15/2013 - Safer online shopping

» 11/29/2013 - Information security: suggestion for how to start 2014

» 11/29/2013 - Social media: the potentials and pitfalls

» 11/29/2013 - What is ransomware?

» 10/24/2013 - SMS spam more dangerous than email spam

» 10/24/2013 - The urban myths surrounding malware

» 10/24/2013 - Don't bank on recovering cyber losses

» 9/22/2013 - Gesture-based passwords found wanting

» 9/22/2013 - Does Office 365 need you more than your need it?

» 9/22/2013 - Android the target of 79 per cent of mobile malware

» 7/22/2013 - Deny hackers their privileges

» 6/21/2013 - Tips for iPad security

» 5/11/2013 - Cyber attacks on SMEs: Prevention is cheaper than cure

» 5/11/2013 - The urban myths surrounding malware

» 4/22/2013 - Report finds data theft by staff on rise

» 4/22/2013 - Tech tip – using signed digital certs with SEP

» 3/16/2013 - CST security technology news