Preventing data disasters, with Matt Johnson (Chief Technology Officer)

A data centre can be the difference between a complete data disaster, and effective data recovery. By entrusting your valuable customer data in one...

Cyber Security: The Biggest Challenges and How to Overcome Them

As an IT manager, does cyber security cause you technological headaches and workplace frustration?

Discovering managed, cloud-based next-generation cybersecurity

Cloud computing is commonplace within the public sector, but have you considered the benefits of using cloud-based security to protect the perimeter...

Whose role is it to tackle cyber security?

I am sure you’ve noticed that the threats to online security are constantly evolving, and have become increasingly sophisticated. At Intercity, we...

5 Minutes with Andy Smith, Intercity Security Operations Centre Manager (‘ISOC’)

Tell us what your role is, and what team you work on…

As the ISOC manager it’s my team that look after annuity services on a 24 hours per day, 7 days...

Gone phishing – Why Android and iPhone users are susceptible to cyber phishing scams

We use our mobiles for everything. From arranging dinner dates to replying to work emails to ordering flowers and even catching up on our favourite...

How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...

How do signature-based attacks work?

Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...

How do firewalls work?

Firewalls are something we take for granted, but as we've seen from some recent high profile security breaches, even the best firewalls are...