“Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact”

James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

Blog

15th May 2017

Are you safe from these common Cyber-attacks?

Do you know out of every 10 people, 7 are at risk of cyber-attacks? Wondering why is that? Well, that’s because of poor security practices and […]
27th April 2017

Powel Experts – Cyber Security

Chief of Cyber Security Mike Loginov on cyber security and how Powel can add value to our clients when it comes to fighting more persistent and […]
10th April 2017

Computer security is broken from top to bottom

OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures […]
7th April 2017

Powel announces new Chief of Cyber Security

Powel is happy to announce the appointment of Mike Loginov, UK Cyber Security Awards ‘Industry Personality of the Year’ as our new Chief of Cyber Security. […]
17th August 2016

If your password is one of the 25 most common passwords?

Passwords are well known as the first line in your cyber defence against unauthorised access. However, a recent survey by SplashData has discovered that many people […]
17th August 2016

No need to shoot the Messenger – Cyber Hack and change the message instead!

The Iranian opposition journalist Saeid Pourheydar leaned about cyber security the hard way. As he was being beaten up in a Tehran prison, his interrogators confronted […]
17th August 2016

Workplace Culture and Cyber Crime: Who is Responsible?

Workplace culture and processes have forever been changed by technology. Home working, video conferencing, emailing, big data management…we could go on. Information and knowledge – and […]
17th August 2016

The Impact of Cyber Security and Social Media on the Global HR Community

As the internet increases global trading opportunities for business, so it also leaves the door wide open for cyber criminals to exploit the systems of organisations […]
17th August 2016

Companies That Export: A Bigger Cyber Security Risk for HR

The rise of businesses with a global reach has led to an increase in cyber security needs. For example the supply chains in the energy industry […]
Macbook Pro
* Intel Core i7 (3.8GHz, 6MB cache)
* Retina Display (2880 x 1880 px)
* NVIDIA GeForce GT 750M (Iris)
* 802.11ac Wi-Fi and Bluetooth 4.0
* Thunderbolt 2 (up to 20Gb/s)
* Faster All-Flash Storage (X1)
* Long Lasting Battery (9 hours)
Yes I'm interested in gamification
and keen to learn more about Quartermaster
so please keep me posted
Your Information will never be shared with any third party.