State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Do you need a regular cybersecurity audit?

2018-05-02T10:51:45+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , |

Do you need a regular cybersecurity audit? Another week, another security breach, or at least that’s how it can seem sometimes. So far this week, we’ve had Hudson’s Bay, Panera and Under Armour all reporting data thefts. They are not the first companies to do so this year and while it would be nice [...]

The role of CFOs and CMOs in cyber security

2018-04-11T12:29:39+00:00April 11th, 2018|Categories: IT Security|Tags: , , , , , |

The role of CFOs and CMOs in cyber security The internet has made it possible for people to work together even when they are on different continents and yet there seems to be nothing technology can do to erase the barriers that can stop different departments from fighting over competing priorities and internal territorial [...]

CyberEssentials & IASME

2017-12-05T14:50:12+00:00October 2nd, 2017|Categories: IT Security|Tags: , , , , |

CyberEssentials & IASME Cyber security in general, and data security in particular, have never been more important or more relevant, and every organisation, from large to small, has to take them very seriously. With that in mind, here is a quick summary of your options with regard to the government-endorsed Cyber Essentials and [...]

Charities are a ‘soft touch’ in cyber security terms

2018-01-04T16:01:35+00:00September 6th, 2017|Categories: IT Security|Tags: , , , , |

Charities are a ‘soft touch’ in cyber security terms Research was carried out earlier this year to identify issues with cyber security within third sector, or charity, organisations. 30 in-depth interviews were carried out to establish attitudes towards cyber security, awareness of relevant issues, approaches to cyber security and the charities’ perceptions and experiences [...]

Password Alert! Are you at risk?

2018-01-04T14:53:02+00:00August 22nd, 2017|Categories: IT Security|Tags: , , , , , , , |

Password Alert! Are you at risk? Are you guilty of using an over-simplified password that a dedicated hacker could uncover as quickly as you can say ‘internet security’? This website lets you test your password and will tell you how long it would take a computer to break into your account. If you find [...]

What people are looking for in an IT company

2018-01-04T14:47:38+00:00August 22nd, 2017|Categories: IT Support|Tags: , , , , , , , , |

What people are looking for in an IT company Organisations engage the services of an IT company for a number of reasons. IT is central to any modern business, whether it’s to manage customer relations or measure stock, or to host a website or manage communications. Increasingly, businesses use voice-over-IP (VoIP) services rather than [...]