Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

New Year resolutions for the security-conscious small business

2019-01-29T15:03:02+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

New Year resolutions for the security-conscious small business What would a new year be without a list of suggested resolutions? On top of vowing to go to the gym three times a week and never smoke again, you will want to check out these three resolutions for security-conscious small businesses. They may be more [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Only 1 in 10 SMEs are ready for GDPR: are you?

2018-04-11T12:33:23+00:00April 11th, 2018|Categories: Compliance|Tags: , , , , |

Only 1 in 10 SMEs are ready for GDPR: are you? Even though the General Data Protection Regulation was adopted on 27th April 2016, only 8% of SMEs have stated that they are ready for when it goes live on 25th May 2018. This would not be so bad if the other 90+% were [...]

The role of CFOs and CMOs in cyber security

2018-04-11T12:29:39+00:00April 11th, 2018|Categories: IT Security|Tags: , , , , , |

The role of CFOs and CMOs in cyber security The internet has made it possible for people to work together even when they are on different continents and yet there seems to be nothing technology can do to erase the barriers that can stop different departments from fighting over competing priorities and internal territorial [...]

Chip security: a lesson in management

2018-04-09T13:41:48+00:00January 22nd, 2018|Categories: IT Security|Tags: , , , , |

Chip security: a lesson in management Up until recently, the term spectre would probably have been associated more with James Bond than computers. In Bond films, supervillains plot to destroy the world through various spectacular means whereas the recent spectre alert is a vulnerability discovered on computer chips that could have had a [...]

The basics of BitLocker

2018-04-09T13:45:12+00:00January 3rd, 2018|Categories: IT Support|Tags: , , , , , , , |

The basics of BitLocker If you’ve never heard of BitLocker then you can take comfort from the fact that you are probably in the majority. Despite its name, BitLocker has nothing to do with Bitcoin. It’s an encryption app that is owned and run by Microsoft and was recommended by the developers of TrueCrypt [...]

E-forensics: what you need to know

2018-04-09T13:45:44+00:00December 14th, 2017|Categories: IT Security|Tags: , , , , , , |

E-forensics: what you need to know If you reported being mugged to the police, you’d expect to have to provide them with enough information for them to start an investigation. As a minimum, you’d expect to have to tell them where and when the attack took place and what was stolen. The same holds [...]

Load More Posts