My name’s Rhys Parsons, I work as a GRC (Governance, Risk and Compliance Analyst) for Siker, however I’ve been asked to discuss some of my hobbies outside of work. Whilst it many may not find it to be particularly of interest. One of the main hobbies that I seek out...
Many if not all businesses share some degree of similarity with one another even with their primary process being separate. Be it a car manufacturing plant compared to a bakery or an accountancy firm. The underlying processes that enable them to function from either...
Late on Monday night, reports emerged of an attempted attack on a city in Florida’s water supply. It is the latest in an increasing number of attacks on critical national infrastructure across the globe. Here at Siker Cyber, we specialise in working...
Home Smart Devices Smart speakers (or voice-enabled assistants) can perform many different services, triggered by voice commands from the user including, but not limited to, playing music, providing weather and traffic updates and keeping notes. There are four main...
What is a CTF? CTF stands for Capture the Flag. In the Cyber Security world this relates to an event where the aim is to hack into systems and find flags to earn points, pride or bragging rights. The flags can be hidden in a multitude of different places and these...
By now most people will have used or at least heard of Zoom and subsequently some of the privacy and security issues that have been brought up surrounding the service. This means we need to configure the software to help avoid some issues and Zoom themselves are...