Try it for yourself
Start my FREE trial now

Have You Encountered 'Security Fatigue'?

Posted on April 19, 2017 by John Lynch |Leave a comment|

Many people today have a love hate relationship with technology. The convenience and knowledge it provides is highly useful, but some people are now getting bored with the many security precautions they must take.

Continue reading →

Is China Launching a New National Intelligence Law?

Posted on April 18, 2017 by John Lynch |Leave a comment|

As the owners of one of the most restricted and censored public internets in the world, China’s file sharing issues are just as notorious as its well-publicised laws and legislation.

However, in March 2017, a new national intelligence law was announced. Will this improve online security or simply increase the China file sharing headache? I take a look:

Continue reading →

Fear Sees UK Cyber Insurance Demand Skyrocket

Posted on April 18, 2017 by John Lynch |Leave a comment|

The number of cyber threats is at an all-time high, as is awareness from business leaders and IT professionals of the risks that could compromise their companies. It now seems that the state of the current cybersecurity industry has resulted in a popularity boom for UK cyber insurance.

Continue reading →

Quatrix v.1.48-54 Release Notes

Posted on April 14, 2017 by Iryna Petryk |Leave a comment|

The following software updates are in these releases:

Continue reading →

The UK and China Agree on Cyber-Security Coordination

Posted on April 13, 2017 by John Lynch |Leave a comment|

In a meeting of minds on the 17th February 2017, China and the UK agreed to cooperate on the cyber-security issues that face both nations.

Continue reading →

Is China’s Industrial Internet Security Failing?

Posted on April 09, 2017 by John Lynch |Leave a comment|

Internet security has always been a high priority for Chinese officials, and things are set to step up a notch as the nation begins its highly-publicised development of its industrial internet.

However, the president of China’s biggest internet security company has recently revealed his nation’s industrial internet is falling behind the ‘regular’ commercial internet in terms of security.

Continue reading →

The Largest Cyberattacks to Hit the UK in Q1 2017

Posted on April 04, 2017 by John Lynch |Leave a comment|

In 2016 3.1 billion private records were leaked – 1,086,820,000 of which in just one month – from thousands of cyberattacks across the world. With predictions that these figuers are set to grow even further in 2017, here we list the largest attacks to hit the UK during Q1 2017 so far.

Continue reading →

Maytech’s China Monthly Update – March 2017

Posted on March 31, 2017 by John Lynch |Leave a comment|

With the new financial year here, business is booming but are there any recent developments hindering secure file transfers with China? Here’s a round-up of the latest cybersecurity news from Asia.

Continue reading →

How Encryption Went Mainstream in 2016

Posted on March 28, 2017 by John Lynch |Leave a comment|


Last year was challenging for online security. Between multiple mega-breaches, such as Yahoo’s hack, and rumours of Russian hackers meddling with the US presidential race, it kept professionals on their toes.

Despite this, one defence method has gone from strength to strength – encryption. Although it is a solution, that isn’t enough to secure your networks alone, encryption security techniques went mainstream in 2016 – being adopted by tech giants such as WhatsApp, Facebook and Google.

Continue reading →

Is the US Power Grid Vulnerable to Online Attack?

Posted on March 27, 2017 by John Lynch |Leave a comment|


At the end of 2016, it was reported that Russian hackers, who had been linked with the previous Democratic National Committee breach, were responsible for a cyberattack on Ukraine’s national utilities, as well as a number of attacks against the US energy sector in 2014.

The Wall Street Journal also reported that a Russian hacking association’s code was detected with in a Vermont utility computer which had penetrated the grid.

However, after being read thousands of times, the story was later revised to clarify that a mistake had been made and the computer in question was not attached to the grid.

Despite this, there are now growing concerns that the US power grid could become a high-profile target for cybercriminals.


Continue reading →