Do you know who’s been reading your email?

2018-08-03T14:51:44+00:00August 3rd, 2018|Categories: IT Security|Tags: , , , , , , |

Do you know who’s been reading your email? Recently, the Wall Street Journal ran an article about the fact that third-party app developers could gain access to your Gmail without you necessarily understanding the fact that you had authorised them to do so. The article was picked up by other news sources and [...]

Small business marketing tools

2018-06-20T13:11:08+00:00June 20th, 2018|Categories: Cloud Services|Tags: , , , , , , , , |

Small business marketing tools Getting people to notice you is possibly the single biggest challenge faced by small businesses and it’s fundamental since nobody is going to buy anything from you, be it goods or services, unless they know you exist and believe you can provide a solution to whatever problem it is they [...]

Do start-ups need outsourced IT support?

2018-05-02T11:04:43+00:00May 2nd, 2018|Categories: IT Support|Tags: , , , , , , |

Do start-ups need outsourced IT support? As anyone who’s done it will know, starting a business isn’t necessarily easy, in fact, there’s a lot to think about, a lot to do and a lot to budget for. This means that many people starting a business may be asking themselves, quite reasonably, whether or not [...]

Cambridge Analytica and Facebook

2018-04-16T19:27:51+00:00April 16th, 2018|Categories: Security Bulletin|Tags: , , , , , |

Cambridge Analytica and Facebook: is your data safe? Cambridge Analytica has made what was probably a rather unwelcome transition from being a niche player to being one of the most (in)famous brand names around. Facebook, meanwhile, has long been controversial from a data protection/privacy perspective and, while some of the stories circulating the [...]

Cloud storage and the question of back-ups

2018-04-11T12:26:58+00:00April 11th, 2018|Categories: Cloud Services|Tags: , , , , , , |

Cloud storage and the question of back-ups Cloud storage site Megaupload was one of the success stories of the internet. It was one of the top fifteen most popular sites online and was believed to be responsible for about 4% of all internet traffic. Then it went out of business, without warning, as a [...]

GDPR: the role of the Data Protection Officer

2018-04-09T13:42:46+00:00January 5th, 2018|Categories: IT Security|Tags: , , , , , , |

GDPR: the role of the Data Protection Officer Under GDPR, all public authorities must appoint Data Protection Officers (DPOs) and all private organisations must appoint DPOs if they either undertake large-scale and systematic monitoring of data subjects or undertake extensive processing of sensitive data. All private organisations means exactly that. Even if you are [...]

Charities are a ‘soft touch’ in cyber security terms

2018-01-04T16:01:35+00:00September 6th, 2017|Categories: IT Security|Tags: , , , , |

Charities are a ‘soft touch’ in cyber security terms Research was carried out earlier this year to identify issues with cyber security within third sector, or charity, organisations. 30 in-depth interviews were carried out to establish attitudes towards cyber security, awareness of relevant issues, approaches to cyber security and the charities’ perceptions and experiences [...]