The ICO and the impact of GDPR

2019-03-19T15:25:02+00:00March 18th, 2019|Categories: Compliance, IT Security|Tags: , , , , , |

The ICO and the impact of GDPR The end of November 2018 marks the 6-month anniversary of GDPR and, while 6 months is a fairly short period of time, it is enough to start to get an idea of what sort of impact GDPR is having and how the ICO is managing it. Here [...]

Is the Krack attack back?

2019-02-13T12:35:40+00:00February 13th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

Is the Krack attack back? WiFi may be one of the greatest conveniences of the 21st century but, as is often the case, with great convenience comes security implications. The dangers of using public WiFi have long been public knowledge, but there have also been concerns about the danger of the WiFi protocol itself. [...]

Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

New Year resolutions for the security-conscious small business

2019-01-29T15:03:02+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

New Year resolutions for the security-conscious small business What would a new year be without a list of suggested resolutions? On top of vowing to go to the gym three times a week and never smoke again, you will want to check out these three resolutions for security-conscious small businesses. They may be more [...]

CISSP: what does it mean for you?

2019-01-29T13:03:36+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , , |

CISSP: what does it mean for you? CISSP stands for Certified Information Systems Security Professional. The certification is backed by the International Information System Security Certification Consortium (ISC) ², which will celebrate its 30th anniversary in 2019. In order to obtain the CISSP credential, candidates have to display an appropriate level of knowledge [...]

Don’t get ‘cyber-mugged’ on holiday this summer

2019-01-02T17:29:41+00:00January 2nd, 2019|Categories: IT Security|Tags: , , , , , |

Don't get 'cyber-mugged' on holiday this summer At this time of year, it’s all about going away on holiday and having the time of our lives. These days, our phones and other devices are integral to our vacation experience, whether that’s Instagramming pics of the local architecture or checking Twitter on the beach. We [...]

Pentagon “Do Not Buy” Software List

2019-01-02T17:26:14+00:00January 2nd, 2019|Categories: IT Security|Tags: , , , , , |

Pentagon “Do Not Buy” Software List The trend towards globalised software development may have just taken an interesting new twist. Over recent years, China, India and Russia have all emerged as countries with banks of talented developers available at a lower cost than their counterparts in some other parts of the world, such as [...]

Cybersecurity experts scarce as threats increase

2018-12-24T16:25:01+00:00December 24th, 2018|Categories: IT Security|Tags: , , , |

Cybersecurity experts scarce as threats increase It can sometimes seem like it is impossible to open a newspaper without coming across a story relating to an IT security scare. To be fair, many of these stories are a few paragraphs in the business section, rather than front page, headline stories, however, both statistics [...]

What CEOs are doing wrong with their cyber security

2018-12-24T16:22:42+00:00December 24th, 2018|Categories: IT Security|Tags: , , , , |

What CEOs are doing wrong with their cyber security Way back in IT prehistory (2004), Michael Soden, then chief executive of the Bank of Ireland group, resigned after it was discovered that he had been visiting websites which were forbidden under company policy. While this story is probably all but forgotten by now, Code42’s [...]

Recovering from a hacking attack on your website

2018-12-24T09:13:07+00:00December 24th, 2018|Categories: IT Security|Tags: , , , , |

Recovering from a hacking attack on your website Hacking attacks are one of the harsh realities of life. While you should, of course, aim to prevent them from happening in the first place, it’s also strongly recommended to have a recovery plan in place in case hackers do get past your security. Here is [...]

Load More Posts