News & Blog

Cyber Support is as essential as IT Support (and is not the same thing)

Cyber Support is as essential as IT Support (and is not the same thing)

An interesting discussion started by my old mate Ian Murphy on LinkedIn, was essentially trying to ask why the majority of business leaders out there hate security. It’s interesting because there are as many opinions as the proverbial pebbles on a beach. My take is not straight forward either.
Read more

Supply Chain Attacks

Supply Chain Attacks

An often forgotten element of Cyber security is within a company’s supply chain. The threat has been around for awhile now but is starting to become much more prevalent targeting your suppliers as a means to get to you. Manufacturers for instance, often use what is known as ‘just in time supply’, ie they have an electronic connection to their key suppliers who are connected up to the company’s inventory, and automatically resupply when an item runs low. It’s efficient and prevents the holding of unnecessary stock. But it can, if not done correctly, drive a coach and horses through your security.
Read more

Ransomware and SMEs

Ransomware and SMEs

REvil, Wizard Spider, Grief, Ragnar, they sound like they should be in a Marvel comic. But there’s nothing funny about these guys. Operating in countries that do not cooperate with international law agencies and not caring who they attack, including health care organisations, Ransomware gangs are on the increase.
Read more

Risk Assessment - An Essential Element for all Business large and small

Risk Assessment - An Essential Element for all Business large and small

I’ve talked a lot in the past about targeting your spend to ensure that you’re money goes on protecting what is really important to you, ensuring that the protections you have spent money on are in the right place, configured to protect what really needs protecting, are maintained correctly and are of course, effective. So how do you do that? Do you just take a good guess at what is needed? Of course not, but it’s still a valid question. Did whoever built your network install a firewall, did they set up an effective anti malware regime ie one that is constantly updated using a process whereby users can’t stop it if it becomes inconvenient? That happens, believe me. Is all of this necessary? Almost certainly. A lot of these questions can be relatively easily answered.
Read more

Data Discovery and Redaction

Data Discovery and Redaction

Do you know where your data is? I’ll bet you’ll say yes, or course, I know exactly where it all is. Well, my experience is somewhat different. It is not uncommon, in the most well regulated of companies, to find that data has been copied or moved around for convenience. During the pandemic, with most working from home, that has become a particular problem. Staff working to a cloud environment, with differing levels of broadband services, become highly tempted to log on and download data to be worked on, and then to upload the results, without remembering to delete what’s on their laptop/desk top, or, actually thinking, ‘I’ll just keep that there – you never know when I might need it’. And so, the companies data is potentially copied many times over.
Read more