The role of the CISO and the challenges it brings

2019-02-13T12:19:12+00:00February 13th, 2019|Categories: Compliance, IT Support|Tags: , , , , |

The role of the CISO and the challenges it brings If there was ever any doubt that the role of Chief Information Security Officer (CISO) was an important one then these questions should have been resolved over recent months. A combination of data-related scandals and the introduction of GDPR should hopefully have convinced [...]

Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

Pentagon “Do Not Buy” Software List

2019-01-02T17:26:14+00:00January 2nd, 2019|Categories: IT Security|Tags: , , , , , |

Pentagon “Do Not Buy” Software List The trend towards globalised software development may have just taken an interesting new twist. Over recent years, China, India and Russia have all emerged as countries with banks of talented developers available at a lower cost than their counterparts in some other parts of the world, such as [...]

Cybersecurity experts scarce as threats increase

2018-12-24T16:25:01+00:00December 24th, 2018|Categories: IT Security|Tags: , , , |

Cybersecurity experts scarce as threats increase It can sometimes seem like it is impossible to open a newspaper without coming across a story relating to an IT security scare. To be fair, many of these stories are a few paragraphs in the business section, rather than front page, headline stories, however, both statistics [...]

Do you know who’s been reading your email?

2018-08-03T14:51:44+00:00August 3rd, 2018|Categories: IT Security|Tags: , , , , , , |

Do you know who’s been reading your email? Recently, the Wall Street Journal ran an article about the fact that third-party app developers could gain access to your Gmail without you necessarily understanding the fact that you had authorised them to do so. The article was picked up by other news sources and [...]

Protecting your cryptocurrency investments

2018-07-17T14:08:51+00:00July 17th, 2018|Categories: Technology Trends|Tags: , , , , , |

Protecting your cryptocurrency investments Cryptocurrencies are unfortunately not immune from theft, as was recently demonstrated when cyberthieves stole about £28M of cryptocurrency from the South Korean exchange, Coinrail. The price of Bitcoin plummeted in response, and it has left people asking what they can do to secure their cryptocurrency investments. Many cryptocurrencies operate outside [...]

Cyber security innovation is overdue. What’s on the cards?

2018-06-08T10:06:50+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , |

Cybersecurity innovation is overdue. What’s on the cards? It’s not like the IT industry hasn’t tried, particularly the payment industry. Think back over the last 40 years or so (since IT began to go truly mainstream) and it’s easy to see that the IT industry, as a whole, has put a lot of effort [...]

The role of the NCSC in cyber security

2018-06-08T09:17:20+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , |

The role of the NCSC in cyber security The National Cyber Security Centre (NCSC) was officially opened in February 2017, although it had actually been operational since October 2016. It comes under the aegis of GCHQ and includes some existing GCHQ staff and has absorbed some staff from other government organisations, along with [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

Load More Posts