Mark Johnson

This post has been provided courtesy of ICA

November 26, 2012

Cybercrime goes commercial

How some websites are using a combination of crowd sourcing, Cloud services and Internet marketing techniques to sell illegal system access and other criminal cyber services online. Gone are the days when ideologically motivated hackers, wearing ponytails and sandals, tapped …

September 14, 2012

The Tortoise and the Hare – Why speed may be less important than awareness when it comes to truly effective cyber security

A Jumbo Jet only travels fifty times faster than a horse and buggy.  A modern computer processes data thousands or millions of times faster than its own forebears.  In fact, Quadrillions of times faster in at least one case. Meanwhile, …

May 10, 2012

The A to Z of Safe Children Online (free PDF copy)

I recently delivered a presentation in Stockholm to corporate staff on the risks arising from poor social media use.  During the Q&A I was asked about guidance for parents and teachers in relation to child online activities.  The audience, drawn …

March 13, 2012

Digital Criminal 2012: CyberSafety Report

TRMG has been working with Legal and General to produce that firm’s Digital Criminal 2012: CyberSafety report.  One of the report’s key findings is that criminals are targeting social media users online by setting up fake profiles, ‘friending’ potential targets …