Blog

7 Ways For Commuters To Protect Data - Beware Shoulder Surfers!

Monday, October 2nd, 2017

We spend a lot of our time and energies reading news about Anonymous, Fancy Bears, Russian state hacks, the USA Presidential Elections and similar related digital information security stories. Not to play down these digital newsworthy cyber attacks and threats (such as Anonymous taking down 10,000…

view more »

How Do You Measure Security?

Friday, September 29th, 2017

Security, or at least successful security, can be measured in many different ways, with the intended final result being "Confidence" (also called Assurance). The extent of confidence in any security system is based on so many factors: How well…

view more »

Where Is Your Data? In-house, in the cloud or Behind the Sofa?

Thursday, September 28th, 2017

Chatting in the office about the approaching GDPR deadline, we were thinking back to some testing we did with our Network Horizons network security monitoring service for an SME client recently. We had to alert them to some data…

view more »

Taking risks with information

Monday, September 25th, 2017

Assessing information security risk as a quick self-help guide - don't know where to start, how do these work, or is it that hard? We in the Information Security community often create a language that only we understand, and if people don't get it we believe that they really need help,…

view more »

GDPR Insights for Marketing Professionals

Monday, September 18th, 2017

What does the Marketing Department have to consider for GDPR compliance? Sign-up here and find out! Recently we've found that questions about…

view more »

How to assess security in cloud vs. in-house computing

Thursday, September 14th, 2017

Cloud or on-premises (or in-house) computing? It's a question we are frequently asked. So we've put together a few considerations. Those who already believe they have the answers need read no further....... The advent of Cloud computing created tremendous opportunities for re-using technologies on a mass scale. Whether…

view more »

Steps to take for Information Security

Tuesday, September 5th, 2017

So far it's been a year for endless hacks, breaches, and general cyber security nightmares so we thought we'd put together a quick fun flowchart to help steer people in the right direction. Should you test your own security before the bad guys do? We…

view more »

SMBs left clueless about what to spend on Cyber Security despite the risks

Tuesday, August 1st, 2017

A recent article in The Independent (31st July - click here to view it ) reveals Small to Medium Businesses are not investing in cyber defense, despite the increase in successful attacks being reported almost daily in the…

view more »

How to Turn Information Security Suspicions into Evidence

Monday, June 12th, 2017

The nature of threats to information security is growing as IT operations and business processes become more complex. Some 83% of global business face security risks from IT and…

view more »

Butch Cassidy and The Ransomware Kid

Friday, May 19th, 2017

"Manos arriba, arriba!!" "El dinero, no es nuestro!" Great lines from a great film; Butch Cassidy and the Sundance Kid - a romantic film about theft and armed robbery in a foreign land. It was after all Paul Newman and Robert Redford so we never sympathised with the victims. Ransomware…

view more »