Facebook’s use of phone numbers rings alarm bells

2020-01-14T09:16:39+00:00January 14th, 2020|Categories: IT Security, Technology Trends|Tags: , , , , |

Facebook's use of phone numbers rings alarm bells As companies increasingly try to persuade their customers to use two-factor authentication for added security when they log into their accounts, some people are anxious about providing their phone number in case it is misused or divulged to the wrong people. Facebook, when it launched [...]

IoT home gadgets to be made more secure

2020-01-02T15:55:53+00:00January 2nd, 2020|Categories: IT Security, Technology Trends|Tags: , , , , |

IoT home gadgets to be made more secure The Internet of Things (IoT) has made our lives more convenient in all kinds of ways but, as anyone involved in security will know all too well, convenience can come at the expense of security. In some contexts, this does not really matter, but when [...]

Don’t lose out on contracts because of inadequate cyber security

2019-12-18T16:13:33+00:00December 18th, 2019|Categories: IT Security|Tags: , , , |

Don’t lose out on contracts because of inadequate cyber security Research from Beaming has shown that 31% of UK businesses would cancel contracts with their suppliers if they believed that those suppliers were affected by a cyber attack. The security of one network depends on the security of the networks around them, and [...]

How two-factor authentication can save you from being hacked

2019-12-18T16:16:53+00:00December 18th, 2019|Categories: IT Security|Tags: , , , , |

How two-factor authentication can save you from being hacked We all know the theory. We should all create an individual, strong password for each of our online accounts, which we should memorise and never, ever write down. As is so often the case, however, that’s all very well in theory, but in practice, most [...]

Alert over lack of cybersecurity experts as threat of attack increases

2019-11-14T16:54:59+00:00November 14th, 2019|Categories: Compliance, IT Security|Tags: , , , |

Alert over lack of cybersecurity experts as threat of attack increases Barely had the internet started to tiptoe into public consciousness, when cyberattacks became a feature of Hollywood blockbuster films.  Now that it has become a core part of everyday life, cyberattacks have stepped out of cinemas and into the real world, and truth [...]

How to undertaken an IT audit – and why you should

2020-01-02T16:14:02+00:00November 14th, 2019|Categories: How To|Tags: , , , , , |

How to undertaken an IT audit – and why you should These days business of all shapes, sizes and industry sectors have come to depend on their IT systems and for practical purposes, it doesn’t really matter if you’re a solopreneur, an SME or a multinational corporation, the fact still remains that any [...]

The role of the CISO and the challenges it brings

2019-02-13T12:19:12+00:00February 13th, 2019|Categories: Compliance, IT Support|Tags: , , , , |

The role of the CISO and the challenges it brings If there was ever any doubt that the role of Chief Information Security Officer (CISO) was an important one then these questions should have been resolved over recent months. A combination of data-related scandals and the introduction of GDPR should hopefully have convinced [...]

Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

Pentagon “Do Not Buy” Software List

2019-01-02T17:26:14+00:00January 2nd, 2019|Categories: IT Security|Tags: , , , , , |

Pentagon “Do Not Buy” Software List The trend towards globalised software development may have just taken an interesting new twist. Over recent years, China, India and Russia have all emerged as countries with banks of talented developers available at a lower cost than their counterparts in some other parts of the world, such as [...]

Cybersecurity experts scarce as threats increase

2018-12-24T16:25:01+00:00December 24th, 2018|Categories: IT Security|Tags: , , , |

Cybersecurity experts scarce as threats increase It can sometimes seem like it is impossible to open a newspaper without coming across a story relating to an IT security scare. To be fair, many of these stories are a few paragraphs in the business section, rather than front page, headline stories, however, both statistics [...]

Load More Posts