0207 438 2045 contact@cyfor.co.uk

0207 438 2045 contact@cyfor.co.uk

CYFOR launches vulnerability assessment services

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Today we have launched a unique vulnerability assessment service to help businesses avoid hackers or disgruntled employees exploiting their systems. With high profile hacking reported daily including recent cases of Sony and SOCA, companies face serious risk by not protecting their IT environment. Joel Tobias, our Managing Director, commented “It’s a cliché, but prevention is Read More…

28th June 2011 | Posted in Cyber Security, News & Events by


Is anyone safe from determined hackers?

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

It seems as if no one is safe these days. Major names in the industry, whose security might otherwise have been expected to be the best, have found that their systems have been compromised by hackers. They are far more vulnerable than they first thought. Sony, Nintendo, SOCA, the NHS and others have fallen foul Read More…

23rd June 2011 | Posted in Cyber Security, News & Events by


Computer forensics investigators attend Fraud Advisory Panel conference

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

The following is taken from a presentation that one of our computer forensics investigators gave at a recent Fraud Advisory Panel conference….. Traditionally, a computer forensics investigation is conducted on a forensic copy or ‘image’ of an item of media which was captured using the methodology previously described. In the days when networks were smaller Read More…

10th June 2011 | Posted in Computer Forensics, Digital Forensics, Forensic Imaging by


Computer forensics – fraud detection and investigation tools

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

One of our forensic investigators recently presented at the Fraud Advisory Panel conference….the presentation was very well received so I thought I’d share it with you – part 1 today and part 2 tomorrow. Fraud has much in common with many other crimes.  Standard computer forensic tools are suitable, in most cases, for finding evidence Read More…

9th June 2011 | Posted in Computer Forensics, Digital Forensics, Events, Forensic Imaging, Fraud, Past Events by


Risk Management within organisations

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Risk management should be an integral part of an organisation’s information security policy to protect the confidentiality of their corporate information, disruption to services and lost business costs. The process of risk management is an ongoing iterative process as the business environment is constantly changing with new threats and vulnerabilities emerging every day. CYFOR supports Read More…

9th June 2011 | Posted in Cyber Security, News & Events by




Certificate Number 11815
ISO 27001, ISO 9001