Newsletter & Blog

Risk Assessment - An Essential Element for all Business large and small

Risk Assessment - An Essential Element for all Business large and small

I’ve talked a lot in the past about targeting your spend to ensure that you’re money goes on protecting what is really important to you, ensuring that the protections you have spent money on are in the right place, configured to protect what really needs protecting, are maintained correctly and are of course, effective. So how do you do that? Do you just take a good guess at what is needed? Of course not, but it’s still a valid question. Did whoever built your network install a firewall, did they set up an effective anti malware regime ie one that is constantly updated using a process whereby users can’t stop it if it becomes inconvenient? That happens, believe me. Is all of this necessary? Almost certainly. A lot of these questions can be relatively easily answered.
Read more

Data Discovery and Redaction

Data Discovery and Redaction

Do you know where your data is? I’ll bet you’ll say yes, or course, I know exactly where it all is. Well, my experience is somewhat different. It is not uncommon, in the most well regulated of companies, to find that data has been copied or moved around for convenience. During the pandemic, with most working from home, that has become a particular problem. Staff working to a cloud environment, with differing levels of broadband services, become highly tempted to log on and download data to be worked on, and then to upload the results, without remembering to delete what’s on their laptop/desk top, or, actually thinking, ‘I’ll just keep that there – you never know when I might need it’. And so, the companies data is potentially copied many times over.
Read more

GDPR Governor

GDPR Governor

GDPR (the Data Protection Act 2018 is basically GDPR with some small changes) requirements apply to all businesses large and small, although some exceptions exist for SMEs. Companies with fewer than 250 employees are not required to keep records of their processing activities unless it's a regular activity, concerns sensitive information or the data could threaten an individuals' rights.
Read more

Consequences of a data breach

Consequences of a data breach

Despite a greater emphasis being placed on data security, data breaches are on the increase. Whether through sophisticated social engineering techniques or more technical attacks, cybercriminals are trying every available tactic to profit from this sensitive information.
Read more

Phishing on LinkedIn

Phishing on LinkedIn

An interesting article on BBC News about Hostile Intelligence Agencies using LinkedIn to gather intelligence data on the business community.
Read more