Prediction: the Next Generation of Cyber Attacks as Shaped by the Top 3 Evolutionary Trends

Date: 2016.09.13 Category: Technology Comments (0) Trackbacks (0)

Heimdal Security Company: 41 Amazing Internet Security Blogs You Should Be Reading

Introduction

How do we stay up-to-date with the latest security news? Where do we find the best security solutions to fight malware? Who can we follow to learn about the latest threats and online attacks so that we can protect ourselves?

With security in our minds, no matter we are common people or a big company name, we need to understand technology if we want to prevent data loss and privacy breaches.

But with so many security blogs out there, which one should we follow?

We have put together a list of security blogs from independent individuals and big names in the IT industry, so that you can benefit from their knowledge and insight. Therefore, if you need best practices, how-to articles, online safety research or the latest security news, feel free to bookmark this article and access it whenever you feel necessary.

1. Krebs on Security

Brian Krebs is the man behind Krebs on Security. Being hacked himself in 2001, he takes a personal interest in online security and is one of the well-known names in today’s security landscape. He covers topics from latest threats, privacy breaches and cyber-criminals to major security news.

2. Schneier on Security

Bruce Schneider is probably the most well-known name that you can recognize in our list, and was even called a “security guru” by The Economist. He wrote books, hundreds of articles, essays and security papers on security matters. At the same time, he is a known figure in the media environment which recognize him as an important voice for the online security, not only for his knowledge on the matter, but also because he knows how to express his opinions.

3. TaoSecurity

This security blog is run by Richard Bejtlich, Chief Security Officer at Mandiant and author of many books on security. With an extensive background on cyber-criminal world and malicious attacks on enterprise networks, he shares his experience on digital defense, network monitoring and detection on his security blog. Since a great number of network attacks come from China, he is specialized on Chinese online criminals.

4. US-CERT

This is the official website of the Department of Homeland Security, from USA.

Though it is not a classical security blog, its purpose is to improve Internet security by providing specialized and well detailed information on cyber-criminal activities, malware, phishing attempts and online threats. To use their own words: “US-CERT strives for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cyber-security information with trusted partners around the world.”

5. Dark Reading

Dark Reading is a widely-read cyber security site that addresses professionals from the IT environment, security researchers and technology specialists. They use their experience and knowledge to provide articles, recommendations, news and information on IT security.

6. CIO

CIO is the place where you find news, information technology articles, insight and analysis on major data breaches and online threats. Covering multiple aspects of world wide web, it provides in-depth, content rich information for IT professionals and normal users.

7. Network Security Blog

Martin McKeay is the voice of this security blog, where you can find information and news on privacy and security issues. As Martin says: “I took up blogging as a means to extend my knowledge and test my ideas about security…”.

8. Security Watch with Neil Rubenking

Known for his direct and witty style, Neil Rubenking is the man you have to listen if you search for technical advice on the main security solutions, from firewalls, antivirus and antispam products to full security suites. Detailed reports and sharp analysis of security programs place him be on your follow list if you look for this type if information.

9. Paul’s Security Weekly

Paul’s Security Weekly, founded by Paul Asadoorian, brings you security news, useful technical articles, research studies and valuable information on hacking and cyber-crime through various channels, from blog posts, videos to podcasts.

10. PCMag.com

One of the most popular sites in the software industry, PC Magazine comes with reviews and studies on the latest products for online security. For an objective analysis of a product you may be looking, don’t forget to look for the dedicated article on this website.

11. Wired

One of the classical North American publications reporting on technology and its role in culture, economy and politics, Wired approaches topics on online privacy, cyber-criminal threats, systems security and the latest alerts.

12. Forbe’s Firewall

Forbe’s Firewall comes from one of the leading media company in the online environment and provides strong analysis, reliable tools and real-time reports for cyber-security news and information on the latest online threats.

13. TechRepublic

TechRepublic provides large resources for the online industry, such as blog articles, forums, technical papers and security data. All the valuable information available helps IT professionals and technology leaders to come with the best decissions on their business processes.

14. Zero Day

The Zero Day security blog is important for all the people which are part of the IT industry and you should follow it to stay up-to-date with the latest security analysis, software vulnerabilities, malware attacks and network threats.

15. Securosis

Securosis is a security research and advisory company that offers security services for companies and organizations. At the same time, you can find on their security blog some useful articles and insight on managing and protecting online data.

16. The Guardian Information Security Hub

Known for its quality articles on world news, Guardian offers a section dedicated to information security for companies and individuals. To stay up-to-date with the latest articles and news on cyber security, make sure you follow this site.

17. Help Net Security

This security site is a popular place for data and security news and you can find here the latest information and articles related to the IT industry.

18. Techworld Security

The section dedicated to security on this site analyzes the latest malware threats and zero-day exploits. You can find here other important topics and subjects, such as security articles, how-to documents and software reviews.

19. Fox IT Security Blog

This security blog is a very good source of information on online security, technology news and cyber crime defense.

20. SC Magazine

SC Magazine comes in the IT environment with technical information and data analysis to fight the present online security threats. Their site provides testing results for e-mail security, mobile devices, cloud and web security.

21. Network Computing

The content of this security blog focuses on cloud technology and enterprise infrastructure systems. Its published articles cover security solutions on how to deliver applications and services for an increasingly large threat environment in the business world, news and expert advice.

22. Infosecurity Magazine

Infosecurity Magazine is an online magazine which covers not only security articles on popular topics, but is also dedicated to security strategy, valuable insights and technical approaches for the online industry.

23. SANS Institute AppSec Blog

This security site addresses the growing malware threats in the online world by providing training, research, certification and educational resources for IT specialists.

24. Threat Track Security

This security blog keeps you up-to-date with the latest innovations and developments in the IT industry, from security exploits to software vulnerabilities and cyber-criminal attempts.

25. CSO Online

CSO focuses on information technology, access management for enterprise servers, loss prevention, cybercriminal threats and software vulnerabilities.

Security blogs from software providers in the IT industry

26. Sophos security blog

Naked Security is Sophos’s award-winning threat news room, giving you news, opinion, advice and research on computer security issues and the latest internet threats. Naked Security is the blog of security company SOPHOS and the place where you can find news, research studies, advices and opinions. Categories range from mobile security threats to operating systems and malware articles. Naked Security is updated multiple times per day and receives around 1.5 million pageviews per month. It has won numerous awards and it is considered one of the best security blogs.

27. Kaspersky Lab’s ThreatPost

Threatpost is the leading security news website that is part of The Kaspersky Lab. Their articles cover important stories and relevant security news for the online world. They are recognized as an important source of news for online security in important newspapers and publications, such as New York Times, USA Today or The Wall Street Journal.

28. Kaspersky Lab’s Securelist

Securelist is a security blog run by Kaspersky Lab and it addresses a large audience, providing some of the best security subjects on cybercriminal activities and data stealing malware. You can find here security information that focuses on malware, phishing and other threats from the cyber security world.

29. Symantec Weblog

Symantec Weblog is a security blog from one of the biggest providers of security solutions world wide, Symantec. Using their technical knowledge and data collected along the years, they come with strong analysis reports and articles on security threats, online criminals, data stealing malware, system vulnerbilities and many others.

30. Google Online Security Blog

We are surrounded by Google products and services, from their search engine to their web browser, so it is normal to include their security blog in our list. It is a reliable security blog and even more, a reference point on online security and privacy we need to acknowledge.

31. Zone Alarm Cyber Security Blog

The security blog from ZoneAlarm, one of the well-known vendors of security products, provides valuable information on malware defense and online security. Using their experience on malware, this security blog generates malware alerts, practical security tips and the latest news in the IT industry.

32. F-Secure Safe & Savvy Blog

A security blog from F-Secure, a company dedicated to online content and privacy protection. On this security blog you will find helpful tips and advises on security issues, from protecting your personal identity to keeping your system safe.

33. HotforSecurity

The security blog from Bitdefender – one of the leading companies on online security solutions, covers various subjects from the IT world, from Internet scams, online spam and phishing to malware and data stealing software.

34. McAfee security blog

McAfee security blog provides the latest tips and techniques from security experts to keep you up-to-date with the latest malware trends in the online environment.

35. Microsoft Malware Protection Center

The Microsoft Malware Protection Center analyzes data from all over the world to provide insight and valuable information on fighting online threats in order to protect users from malware attacks and online crime.

36. SpiderLabs Security Blog

Investigators and researchers at Trustwave cover the latest technology news on this security blog. Gathering information from research and testing, they publish articles and security studies to fight online hackers and cyber-criminal threats.

37. Dell SecureWorks

The security blog from Dell SecureWorks provides the latest news and information for IT professionals and users that need to stay up-to-date with online threats and malware attacks.

38. Malwarebytes Security Blog

The Malwarebytes security blog articles cover the latest malware threats and cyber criminal attempts from the online world. You can find their articles on categories, from cyber-crime, exploits, hacking and malware analysis.

39. Trend Micro Simply Security

Trend Micro Simply Security site offers expert insights on cloud security, data safety, privacy protection and threat intelligence.

40. We Live Security

We Live Security, the Eset blog, is an online resource for cyber security articles and this blog covers a large network of security topics from emerging online threats to zero-day exploits.

41. CSIS Security Group Blog

The security blog from CSIS Security Group provides valuable information on malware attacks and online threats. Using the internal research data from their own security labs, their studies help users fight cyber-criminal threats.

Conclusions

We know our list is not perfect, there are so many other security blogs and top influencers in the IT industry that we have not included and we can not assume this list is complete. We try to stay in tune with the latest updates in the industry and we provided a few reasons why you should follow the security blogs above.

But, since the Internet world and the security landscape is changing all the time, so must we. So, help us improve our article, let us know what you think, we have no problem in making changes to our article and improve it for the benefit of all.
Date: 2016.07.03 Category: Technology Comments (0) Trackbacks (0)

Heimdal Security Company: Top Online Scams Used by Cyber Criminals to Trick You [Updated]

Cyber criminals affected the online businesses and individuals since the internet networks first appeared and spread all over the world.

Internet services and websites make it easy for us to pay bills, shop, make online reservations and even work. And you can do any of these actions from any place in the world. Old boundaries and human limitations were dropped, in order for us to have access to almost any information. Our lives became so much easier.

But the same thing is true for CRIME.

Our freedom to navigate and access a wide number of online locations represents in the same time a main vulnerability, because an open door always allows access in both directions.

Criminal minds can reach these days further than before, into our private lives, our homes and work offices. And there is little we can do about it.

Attack methods and tools vary from traditional attack vectors, which use malicious software and vulnerabilities present in almost all the programs and apps (even in the popular Windows operating systems), to ingenious phishing scams deployed from unexpected regions of the world, where justice can’t easily reach out to catch the eventual perpetrators.

The most common ways for you to become vulnerable to a malware attack or phishing scam take place when you:

• shop online
• check your email
• access social media networks

For this reason, we need to know what are the most popular schemes and techniques used by cyber criminals in order to obtain our private information and financial data.

We must not forget their final target is always our money and there is nothing they won’t do to accomplish their mission.

1. Phishing email scams

Phishing scams are based on communication made via email or on social networks. Cyber criminals will send you messages and try to trick you into giving them your login credentials – from your bank account, social network, work account, cloud storage or any other personal data that can prove to be valuable for them.

In order to do that, the phishing emails will seem to come from an official source – it can be bank authorities or other financial institutes, but also delivery companies or social networks representatives.

This way, they’ll persuade you to click on the links contained by their messages and access a website that looks legit, looks like the real one, but it’s actually controlled by them. You will be sent to a fake login access page that resembles the real website.

This way, if you’re not paying attention, you might end up giving your login credentials and other personal information.

In order for their success rate to grow, scammers create a sense of urgency. They’ll tell you a frightening story of how your bank account is under threat and how you really need to access as soon as possible a web page where your must insert your credentials in order to confirm your identity or your account.

Of course, the provided link will only lead you to the fake web location and not to the real login page.

After you fill in your online banking credentials, cyber criminals use them to breach your real bank account or to sell them on the dark web to other interested parties.

It’s one of the main scamming techniques used to spread financial and data stealing malware. There isn’t any reason why you shouldn’t be very well prepared for this attempt. However, even if you install a good antivirus program, there is no better way to stay safe from this threat but to avoid the initial infection phase.

Here’s a complete guide on how to detect and prevent phishing attacks – filled with screenshots and actionable tips.

2. The money laundering scam

This money laundering scam – also known as the Nigerian scam – is actually one of the oldest and most popular scamming schemes. Most of us already encountered it in our own email inbox, in one form or another.

Since it’s an old scam, it suffered multiple variations along the years.

The typical scam starts with an emotional email message. It can be from an official government member, a businessman or a member of a very wealthy family member (usually a woman) who asks you to provide help in retrieving a large sum of money from a bank, paying initially small fees for papers and legal matters. In exchange for your help, they promise you a very large sum of money.

Of course, this is just the beginning. Afterwards, they ask you to pay more and more for additional services, such as transactions or transfer costs. You even receive papers that are supposed to make you believe that it’s all for real. In the end, you are left broke and without any of the promised money.

There were also cases where not only money was lost in the scam, but people were kidnapped or even worse.

In this blog post we exposed more examples of scams carried on social media networks (tips on how to stay safe from them included).

3. Greeting card scams

This is another old scam: the greeting cards that you receive in your email inbox and seem to be coming from a friend.

If you open such an email and click on the card, you usually end up with malicious software that is being downloaded and installed on your operating system.

The malware may be an annoying program that will launch pop-ups with ads, unexpected windows all over the screen. However, it can also be ransomware or one of the worst financial malware that’s been around, part of the infamous Zeus family.

If your system becomes infected with such dangerous malware, you will become one of the bots which are part of a larger network of affected computers. In this unfortunate event, your computer will start sending private data and financial information to a fraudulent server controlled by IT criminals.

To keep yourself safe from identity theft and data breach, we recommend using a specialized security program against this type of dangers.

4. A guaranteed bank loan or credit card scam

Difficult times push people into getting trapped by “too good to be true” bank offers that guarantee you large amounts of money and have already been pre-approved by the bank.

If such an incredible pre-approved loan is offered to you, simply use your common sense to judge if it’s for real or not.

How is it possible for a bank to offer you such a large sum of money without even knowing your financial situation?

Though it may seem unlikely for people to get trapped by this scam, there’s still a big number of people who lost money by paying the “mandatory” processing fees required by the scammers.

5. Lottery scam

One more classic scam which never seems to get old. The lottery scam comes as an email message informing you that you won a huge amount of money and all you need to do to collect your fortune is to pay some small fees.

Lucky you! It doesn’t even matter that you don’t recall ever purchasing lottery tickets.

Since it addresses some of our wildest fantasies, such as quitting our jobs and living off the fortune for the rest of our lives, without ever having to work again, our imagination falls prey easily to images of a dreamhouse, endless summer vacations or expensive items that a normal man can only dream of.

But the dream ends as soon as you realize you have been just another scam victim.

6. Hitman scam

One of the most frequent scams you can meet online is the “hitman” extortion attempt. Cyber criminals will send you an email threatening you in order to obtain money.

This type of scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers.

To create the appearance of a real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or, more and more frequently, from a social network account.

That’s why it’s not wise to offer sensitive, personal information about you on social media. It might seem like a safe and private place, where you’re only surrounded by friends, but in reality you can never know for sure who’s watching you.

That’s why sometimes it’s better to be a little bit paranoid.

7. Romance scams

How many of us have already been fooled by this one? Since this one addresses our subjective self and not our rational side, we tend to drop our guard and leave aside any logical analysis.

This scam takes place on social dating networks, like Facebook, or by sending a simple email to the potential target.

The male scammers are often located in West Africa, while the female scammers are mostly from the eastern parts of Europe.

Cyber criminals have abused this scamming method for years by using the online dating services. They improved their approach just by testing the potential victims’ reactions.

This scheme or this game may take place for several months or more in order to gain the trust of that person. In many cases, it even goes to the moment when a meeting is arranged.

When this happens, two things may take place:

an “unpredictable” event occurs and the scammer needs money as soon as possible for his/her passport or other details.

• if the victim comes from a rich family, he/she may be kidnapped and a large sum of money could be requested from the family.
• In a recent romance scam case that was mediatized, a woman lost £1.6 million after she met two conmen on a dating site.

8. Fake antivirus software

We all saw at least once this message on our screens: “You have been infected! Download antivirus X right now to protect your computer!”.

Many of these pop-ups were very well created to resemble actual messages that you might get from Windows or from a normal security product.

If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online.

In this case, to get rid of the annoying pop-ups, we recommend scanning your system using a good antivirus product.

If you are not so lucky, you can end up with malware on your system, such as a Trojan or a keylogger.

This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.

To avoid this situation, we recommend using a specialized security product against this kind of financial malware, besides your traditional antivirus program.

9. Facebook impersonation scam (hijacked profile scam)

Facebook is today the most popular social media network. For this reason, important companies and businesses use it to communicate with customers and promote their products.

With so many friends and connections on this online platform, we use Facebook not only to check our friends’ activities and updates, but also to chat with them.

If most friends, colleagues and social connections are on Facebook, it is perfectly normal for such a place to also attract the unwanted attention of online scammers.

Just imagine your account being hacked by a cyber criminal and gaining access to your close friends and family.

Since it is so important for your privacy and online security, you should be very careful in protecting your personal online accounts just the way you protect your banking or email account. Set a double authentication method as soon as possible. This will act as an additional layer of security, besides your password.

10. Make money fast scams (Economic scams)

The following common online scam is extremely popular: cyber criminals will lure you into believing you can make easy money on the internet. They’ll promise you non-existent jobs, plans and methods of getting rich quickly and money from official government sources.

It is a quite simple and effective approach, because it simply addresses one’s basic need for money, especially when that person is in a difficult financial situation.

From this point of view, this scamming method is similar to the romance scam mentioned above, where the cyber attackers address the romantic needs of the victim.

The fraudulent posting of non-existent jobs for a variety of positions is part of the online criminals’ arsenal.

Using various job types, such as work-at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well paid job that will bring lots of money in a very short period of time.

11. Travel scams

These scams usually appear in the hot summer months or before the short winter vacations, for Christmas or New Year’s Day.

The scenario is usually like this: you receive an email containing an amazing offer for an extraordinary hard to get to destination (usually an exotic place) that expires in a short period of time and you must not miss.

The problem is that some of these offers actually hide some necessary costs until you pay for the initial offer. Others simply take your money without sending you anywhere.

In such cases, we suggest that you study very well the travel offer and look for hidden costs, such as: airport taxes, tickets that you need to pay to access a local attraction, check if the meals are included or not, other local transportation fees between your airport and the hotel or between the hotel and the main attractions mentioned in the initial offer, etc.

As a general rule, we suggest that you go with the trustworthy, well known travel agencies.

You can also check if by paying individually for plane tickets and for accommodation you receive the same results as in the received offer.

Conclusion

Online scams developed using increasingly sophisticated means of deceiving users, especially in the rich Western countries.

According to FBI, online scams have increased over the last 10 years and the total losses doubled in the recent years, affecting both private individuals and large scale businesses. For this reason, cyber criminal activities are now subject to federal investigations and are treated as a very serious problem that affects us all.

You may think that you can’t be fooled by these online scams, since some of them are quite hilarious, such as the one promising to send you money or the one where the scammers pretend to be FBI agents.

But some stories are so convincing for the potential victims that it is difficult to know how to deal with them.
Since some scams are so well organized and convincing, and the people behind so difficult to catch, we need to always keep our guard up. Stay informed about the latest scamming strategies.

Date: 2016.06.12 Category: Technology Comments (0) Trackbacks (0)

Cybersecurity Fraud Intelligence Lead – Vice President

The Cybersecurity organization's objective is to ensure that JPMC is able to effectively detect, prevent, and respond to cyber threats against our technology infrastructure. The scope of Cybersecurity comprises detection and monitoring of threats and vulnerabilities, managing security incidents, and evolving our preventive infrastructure to keep ahead of the threat. We accomplish this through strong information security leadership and active collaboration with line of business information risk managers to provide high quality security solutions and services that are focused on improving the Firm's risk posture.

The Cyber Fraud APAC and South America Lead will work closely with Fraud Intelligence teams within Cyber Security Operations to maintain and advance intelligence collection efforts, optimize reporting, and manage metrics production.

Responsibilities:

• Lead efforts across Fraud Intelligence teams (card, banking, data automation) to expand the teams' intelligence collection, optimize reporting to internal stakeholders, and assist in managing expanding metrics production efforts specific to the Asia Pacific and South American geographic areas
• Act as the Fraud Intelligence lead representative in a multi-disciplinary security operations center (SOC)
• Act as liaison between Corporate Cyber Security Operations-Fraud Intelligence and the various JPMC lines of business (LOBs)
• Work closely with Cyber Security Operations teams to collaborate on a first in class intelligence program.
• Maintain and advance knowledge of industry fraud trends
• Conduct and manage detailed analysis and risk assessments on all issues affecting the Firm
• Engage in problem solving, process improvement, and strategic planning initiatives
• Continually identify and evaluate 3 rd party solutions to fraud problems facing the Firm
• Author and edit intelligence reports and contribute to metrics production

Qualifications

5+ years of experience with at least 3 collecting and analyzing intelligence, conducting financial investigations, and/or working in banking technology, risk, or operations including APAC and South America

• 3+ years of experience collecting and analyzing intelligence, conducting financial investigations, and writing professional reports
• Experience with large volumes of transactional data, conducting deep-dive analysis, and financial services industry products and services
• Experience serving business stakeholders, managing cross collaboration, and leading teams
• Strong knowledge of banking terms, phrases, and concepts
• Prior cyber security and/or cyber threat experience a plus
• The ability to work in a fast paced environment to include the translation of complex concepts and issues into messaging easily understood by senior leadership
• Bachelor's degree or equivalent experience
• Prior threat intelligence/SOC experience a plus

People Skills:

• Excellent people, time management, and organization skills
• An ability to work with minimal direction and supervision-independently or in leadership role
• Experience managing aggressive deadlines in a fast-paced environment
• The ability to coordinate, work with, and gain the trust of business stakeholders to achieve a desired objective

Process Skills:

• Strong attention to detail in conducting analysis combined with ability to accurately record full supporting documentation
• An ability to leverage the efforts of multiple teams into a cohesive product/service
• An ability to mitigate a vulnerability or issue by leveraging support from internal stakeholders in a collaborative approach
• An ability to conduct critical analysis, form a hypothesis, and make recommendations to senior management
• An ability to mitigate a vulnerability or issue by leveraging support from internal stakeholders in a collaborative approach

Communication Skills:

• Excellent written and verbal communication skills are required
• Able to articulate and visually present complex analysis results
• Ability to communicate effectively with business representatives in explaining findings clearly and where necessary, in layman's terms

This position is anticipated to require the use of one or more High Security Access (HSA) systems. Users of these systems are subject to enhanced screening which includes both criminal and credit background checks, and/or other enhanced screening at the time of accepting the position and on an annual basis thereafter. The enhanced screening will need to be successfully completed prior to commencing employment or assignment.

J.P. Morgan is a place for talented people from all backgrounds and perspectives because our clients come from all backgrounds and perspectives. We encourage a culture of inclusion, where everyone's opinion counts and all employees have the freedom to deliver their absolute best. This is why we work hard and invest in attracting and developing a diverse workforce. Learn more about our Business Resource Groups in how they help our employees build successful careers and reach their greatest potential.

Date: 2016.05.31 Category: Technology Comments (0) Trackbacks (0)

PCH Boiler Repair and Installation

Boiler installation Call us on 07769 555030



We undertake all types of boiler installation


Before any new boiler installation or boiler replacement we undertake, we send out on request one of our gas safe registered engineers to vist your property and evaluate the current installation. The engineer will calculate the right size boiler and help you to choose the one that would suits your property and your budget best. We will provide you with a free written quote for the new boiler installation shortly after the visit.


Our team of fully qualified Gas Safe Registered Engineers install all types of residential gas fired boilers (Combination boilers known as combi boilers, system boilers, and heat only boilers.) All our new boiler installations come with the added benefit of a free boiler & central heating power flush and landlord gas safety certificate if the property to be rented.


Baxi boiler installation


As a keen gas engineers, we love Baxi brand for it’s heritage (since 1866 providing heating & hot water solutions), great design, the simplicity to install and use, let alone the reliability and the affordable price all Baxi products come with, which ultimately help us as a proud heating engineers to keep our reputation high . We only choose our products (boilers and contrals) from well trusted boiler manufacturers such as Baxi, Worcester Bosch, Vaillant, Glow Worm, honeywell and Drayton.


All our boiler installations come with added one years labour guarantee on top of  the manufacturer’s warranty, which would amount to 11 years depending on the manufacturere, Baxi offers the industry leading 10 years warranty on Platinum combi boiler, and 5-7 on other models.


New Condensing Boiler installation


PCH Gas Safe Engineers only supply you with the most efficient and reliable condensing boilers on the market today (a-rated, fully modulating). We are very careful to test all products and systems we supply or install. We stay ahead of the game, we visit boiler manufacturers and we test new boilers and systems regularly to guarantee they will provide you with safety and efficiently.


Before boiler installation


It is paramount that you obtain the right advice before choosing your new boiler, our team are on hand to explain to you how to get the best out of our heating systems. We will provide you with the best brochures and information on the options available for your new boiler installation.


Our friendly, well-informed staff are on hand to demonstrate to you how all our products (boilers, central heating system controls) work. To discuss your new boiler installation, maintenance requirements, or:


for a free quote on new boiler installation Call us anytime on  07769 555030 or email us to pchboilerrepair@gmail.com


Date: 2014.10.30 Category: Technology Comments (0) Trackbacks (0)