Resources

Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

The Never-Ending Learning Curve

Not so long ago I wrote two blog posts on the Heartbleed vulnerability in OpenSSL. In one of them I alluded to the fact that we have not seen the end of it, unfortunately I was right.
Blog

Inside Out, Outside in, Inside in...

Threats from outside the organization are still happening, but it's the threats from within which are causing a greater challenge. Not just employees but third parties who have access to internal systems and information.
Blog

10 Essential Steps to Security for Businesses - part 2

To mark the close of EU National Cyber Security Awareness Month, this week we’ll be providing a couple of top tips per day to help ensure that both internal and external company data remains secure. Top Tip 3: Attack spyware from multiple angles Spyware is one of the more insidious (and annoying) web hazards. Fight it from all directions: Stop it at the gateway – with automated filtering and...
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?