Cyber Works

Cyber Works Articles & Resources

A series of articles about technology and innovation from across the Cyber Works projects, written for a non-technial audience.

Lego Stormtrooper

Virtual Private Networks: What Are They? How Do They Work?

Virtual Private Networks (VPNs) are increasingly being used to work from home and have many uses, from being able to access the office IT network, or critical business systems; to being able to watch TV normally available in your own country. 

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Faceless man

Authentication: Are You Really Who You Say You Are?

Multi-factor authentication is one of the easiest methods to ensure that your accounts stay secure, and no one apart from you can access your personal data. A wide range of methods are available on almost all websites, and there is little reason not to enable it!

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Social Media

Social Media: Social Media Security, Privacy & Footprints

Social Media opens up a whole new audience for businesses, and enables people to keep in touch with friends and families virtually. However, as social media becomes even more popular, we need to ensure that we retain our privacy and don’t reveal too much. 

If you would like to know more then you can click the link below to download the full article: 

Cyber Works - Social Media

Cryptography

Cryptography: Protecting the World's Secrets

Cryptography is used every day by almost everyone; and secures everything we do on the internet. But how has it developed from the days ofJulius Caesar to securing the internet today?

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Padlock on Credit Card

Formjacking: What is it and how does it work?

Formjacking is a relatively new technique which cyber criminals are using to exploit and steal potentially sensitive information from commercial websites. 

If you would like to know more about this then you can click the link below to download the full article: 

A finger presses a button a virtual interface

8 Cyber Innovation Predictions for 2020

2019 was an eventful year and the end of an eventful decade for cyber innovations. We predict that the next decade will bring even more disruptions and opportunities. Starting with the incumbent year see below for our eight headline predictions for 2020

If you would like to know what we think lies ahead then click the link below to download the full article:

A digital illustration of links in a chain

Blockchain: Cutting Through the Hype

“Don’t be fooled by unrealistic predictions of returns and claims made through press releases, spam email, telemarketing calls, posts online or in social media threads. These actions may be signs of a classic ‘pump and dump’ fraud”

–Financial Industry Regulatory Authority

Does your business need to consider blockchain?

With all the talk surrounding blockchain and Bitcoin, it is often hard to spot the hype from reality. With every new technology, there is a rush to implement it into your business model to show your business is on the cutting edge, however as history has often taught us, early adopters can sometimes be stung. Click the link below to download the full article: 

Counterfeit Products

Counterfeit Devices: Protecting your business from imitation hardware

As the costs of research and development rise, innovative hardware devices that reflect these increased expenses are being targeted by counterfeit criminals.

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Security Threats

Advanced Persistent Threats: What are they and do they really exist?

The use of the term Advanced Persistent Threat has been on the rise lately, as more evidence is shared that not only proves they exist, but they are actively attacking targets

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Logging

Logging: What is it and why is it important?

Log files are highly valuble data sets which are frequently used by software developers and engineers to understand what has gone wrong. Is that the limit to their value?

If you would like to know more about this then you can click the link below to download the full article (PDF): 

Phishing illustration

Social Engineering: Hacking the Human

We live in a digital age where the technolgy is continually improving. Whilst cyber security is constantly evolving to combat cyber criminals, human psychology remains realtively unchanged. Social engineering is a threat we must always consider. This article looks to inform you what it is, and how to stay ahead of it. 

If you would like to know more then you can click the link below to download the full article: 

An illustration featuring computer code

What is a Cyber Assist Project?

The Greater Manchester Cyber Foundry (GMCF) offers the opportunity for small to medium enterprises to explore the development of new digital products and services.

The GMCF Cyber Innovation team provides a Research & Development service, enabling practical investigation of innovative applications of technology within a business, often leading to a software prototype.

If you would like to learn more about this service, please download the GMCF Tech Assist Article.

A Brief Introduction to Quantum Computing

A Brief Introduction to Quantum Computing

Quantum computers have appeared in science fiction novels and films for years but what actually are they and why are so many tech giants talking about them now? Modern computing technology has come far from the first computer and now quantum computers are no longer science fiction. What does the mean for modern technology and more importantly security?

If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

Zoom vs. Teams vs. Meet: Which should you use?

Zoom vs. Teams vs. Meet: Which should you use?

The three main frontrunners in the video conferencing arms race are: Zoom, Microsoft Teams and Google Meet. You’d be forgiven for thinking that “they’re all the same, right?” This is broadly true, and they share a lot of the same core functionality but they differ around security.

If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

Is 3D printing secure enough for your business?

Is 3D printing secure enough for your business?

3D printing, also known as additive manufacturing, is becoming more mainstream with 3D printers more commercially available. The cost of 3D printers has plummeted. At the time of writing, there are 3D printers as cheap as £70. The accuracy of 3D printing has improved and continues to get better. The machines are more user-friendly, and it’s easier to design 3D models thanks to free software programs.

If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

A Business Introduction to Social Media

A Business Introduction to Social Media

Social media is a powerful communications tool which offers distinct and unique marketing benefits. Every major organisation in the world uses social media. You don’t need to be a marketing expert to use social media effectively, whatever resources you have, with social media, a little can go a long way.

‌If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

A Brief Introduction to Artificial Intelligence

A Brief Introduction to Artificial Intelligence

The first thing that may come to mind when considering artificial intelligence may be the idea of machines that are just as intelligent as humans or may be near indistinguishable from human minds. Artificial intelligence does include such study, as well as the more philosophical ideas of what the implications of a “thinking machine” would be, AI also encompasses a much broader area of development. Artificial intelligence includes software such as rules based systems, predictive analytics and pattern recognition.

If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

A Small Business Guide to Backing Up

A Small Business Guide to Backing Up

The first lecture I ever received as a Computer Science undergraduate was about the importance of backing up data. It is essential for everyone but particularly important for small businesses. Small businesses often don’t have the infrastructure of larger companies and as such backing up is often seen as a hassle. Here’s an easy small business guide to backing up your data.

If you would like to know more about this then you can click the link below to download the full article (PDF): 

 

Business Social Media Guidance

Business Social Media Guidance

Social media is a powerful communications tool. It can be tricky to get the mix of personal and professional right, and it can be overwhelming- Who to follow? How often to engage? What platform to focus us? What to say?

If you would like to know more about this then you can click the link below to download the full article (PDF):