Email and GDPR: can you check your employees’ emails?

2020-01-14T09:44:33+00:00January 14th, 2020|Categories: Compliance, IT Support|Tags: , , , , |

Email and GDPR: can you check your employees’ emails? End users (in this case employees) and IT departments often see corporate email as being one of their major professional challenges, albeit for very different reasons. To end-users, the volume of email processed each and every day is often a time sink that can gobble away at their productivity, whereas to IT [...]

Don’t lose out on contracts because of inadequate cyber security

2019-12-18T16:13:33+00:00December 18th, 2019|Categories: IT Security|Tags: , , , |

Don’t lose out on contracts because of inadequate cyber security Research from Beaming has shown that 31% of UK businesses would cancel contracts with their suppliers if they believed that those suppliers were affected by a cyber attack. The security of one network depends on the security of the networks around them, and [...]

Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

New Year resolutions for the security-conscious small business

2019-01-29T15:03:02+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

New Year resolutions for the security-conscious small business What would a new year be without a list of suggested resolutions? On top of vowing to go to the gym three times a week and never smoke again, you will want to check out these three resolutions for security-conscious small businesses. They may be more [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Only 1 in 10 SMEs are ready for GDPR: are you?

2018-04-11T12:33:23+00:00April 11th, 2018|Categories: Compliance|Tags: , , , , |

Only 1 in 10 SMEs are ready for GDPR: are you? Even though the General Data Protection Regulation was adopted on 27th April 2016, only 8% of SMEs have stated that they are ready for when it goes live on 25th May 2018. This would not be so bad if the other 90+% were [...]

The role of CFOs and CMOs in cyber security

2018-04-11T12:29:39+00:00April 11th, 2018|Categories: IT Security|Tags: , , , , , |

The role of CFOs and CMOs in cyber security The internet has made it possible for people to work together even when they are on different continents and yet there seems to be nothing technology can do to erase the barriers that can stop different departments from fighting over competing priorities and internal territorial [...]

Chip security: a lesson in management

2018-04-09T13:41:48+00:00January 22nd, 2018|Categories: IT Security|Tags: , , , , |

Chip security: a lesson in management Up until recently, the term spectre would probably have been associated more with James Bond than computers. In Bond films, supervillains plot to destroy the world through various spectacular means whereas the recent spectre alert is a vulnerability discovered on computer chips that could have had a [...]

Load More Posts