0161 797 8123 contact@cyfor.co.uk

0161 797 8123 contact@cyfor.co.uk

CYFOR launches vulnerability assessment services

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Today we have launched a unique service to help businesses avoid hackers or disgruntled employees exploiting their vulnerabilities. With high profile hacking reported daily including recent cases of Sony and SOCA, companies face serious risk by not protecting their IT environment.  Joel Tobias, our Managing Director, commented “It’s a cliché, but prevention is better than Read More…

28th June 2011 | Posted in Cyber Security, News & Events by


Is anyone safe from hackers?

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

It seems as if no one is safe these days. Major names in the industry, whose security might otherwise have been expected to be the best, have found that their systems have been compromised and that they are far more vulnerable than they thought. Sony, Nintendo, SOCA, the NHS and others have fallen foul to Read More…

23rd June 2011 | Posted in Cyber Security, News & Events by


Recent developments in computer forensic analysis

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

As mentioned in my blog yesterday, of which this is part 2, the following is taken from a presentation that one of our forensic investigators gave at a recent Fraud Advisory Panel conference….. Traditionally, forensic investigations are conducted on a forensic copy or ‘image’ of an item of media which was captured using the methodology Read More…

10th June 2011 | Posted in Computer Forensics, Digital Forensics, Forensic Imaging by


Computer aided fraud detection and investigation tools

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

One of our forensic investigators recently presented at the Fraud Advisory Panel conference….the presentation was very well received so I thought I’d share it with you – part 1 today and part 2 tomorrow. Fraud has much in common with many other crimes.  Standard computer forensic tools are suitable, in most cases, for finding evidence Read More…

9th June 2011 | Posted in Computer Forensics, Digital Forensics, Events, Forensic Imaging, Fraud, Past Events by


CYFOR Secure

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Risk management should be an integral part of an organisation’s information security policy to protect the confidentiality of their corporate information, disruption to services and lost business costs.  The process of risk management is an ongoing iterative process as the business environment is constantly changing with new threats and vulnerabilities emerging every day. CYFOR supports Read More…

9th June 2011 | Posted in Uncategorized by




Certificate Number 11815
ISO 27001, ISO 9001