Business Data  =  Business Risk

There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don’t know. But there are also unknown unknowns. There are things we don’t know we don’t know

Donald Rumsfeld – US Department of Defence news briefing (12 February 2002)

The CIA Triad of Data Security

Data Confidentiality

Data Integrity

Data Availability

Protect the data you hold on behalf of your clients, suppliers and the business

Protect your Business Reputation  –  Reduce your Business Risk Exposure

You’ve Been Hacked   –  Videos

FREE Wi-Fi Hack

 – Specifically for SME Companies –

SME - Office

SME - Mobile

 

 – Client Services –

Z

Business Accreditation

Audit & Compliance

l

Consultancy

Policy Documentation

Internal Staff Training

What the Hacker Can See

 

 – ‘Must Have’ Software –

EndPoint Security

Encryption

VPN & Comms

12 Step Security for Business Data

Develop and Promote your own Business Security Culture

– News, Articles and Blogs –

Want Some Privacy?

Want Some Privacy?

Search & Browsing Ever wondered why adverts for items you have previously searched for using Google seem to follow you around the web and appear constantly? Google is thought to be a search engine – it’s not; it’s an advertising giant with its own power plants and...

read more
Suffolk Launch of NSCSC

Suffolk Launch of NSCSC

Norfolk & Suffolk Cyber Security Cluster launches in Suffolk, September 16th 2019 at Innovate Martlesham with fantastic help and sponsorship from Nicky Daniels and team. Refreshments have been sponsored by Cooper Lomaz Recruitment Three fantastic speakers on a...

read more
Does Cyber Insurance cover Loss of Business Reputation?

Does Cyber Insurance cover Loss of Business Reputation?

It was a simple question - I was trying to generate some interest in our services from a local business - a large Accountancy Practice. I wanted to offer our services either to the firm or as part of a presentation to their clients - cyber security is such an...

read more
GDPR in 5 minutes

GDPR in 5 minutes

Doom mongers predicting impending disaster have heralded the new data protection laws which come into force on May 25th 2018 in the UK – the General Data Protection Regulation (GDPR) is not just a UK based law, it is global and will affect any company which offers...

read more
They’re Watching You (Part 3 of 3)

They’re Watching You (Part 3 of 3)

Previously Posted - Part 1 Article - Browser Protection Previously Posted - Part 2 Article - More Add-Ons for Firefox In one of my previous lives, all the mobile devices were heavily re-engineered prior to being used - now this may seem to be slightly "over the top",...

read more
They’re Watching You (Part 2 of 3)

They’re Watching You (Part 2 of 3)

Previously Posted - Part 1 Article - Browser Protection More FIREFOX ADD-ONs - additional Firefox extensions that are worth considering: Disconnect Similar to Ghostery, Disconnect is an add-on that blocks web trackers from gathering your personal information....

read more
IoT – Botnet attacks again – but bigger and better

IoT – Botnet attacks again – but bigger and better

Basic steps to Protect your IoT Devices from being Hacked   Anyone who remembers the Mirai botnet, which caused huge problems in 2016, may be forgiven for thinking steps had been taken to prevent a similar disaster. However, another mysterious botnet, dubbed the...

read more
They’re watching you (1 of 3)

They’re watching you (1 of 3)

Be careful using Google, Twitter, Apple, Yahoo, AOL, Skype, Microsoft, YouTube and Facebook - All these sites (and more) are thought to collect huge amounts of data on you, which they sell to advertisers and allow access to government agencies. Limit or stop all use...

read more
Send them to Jail

Send them to Jail

Forgive me as I'm typing this with my tongue in my cheek ...... Apparently, some unknown hackers managed to exploit a "security flaw" on the Equifax systems and gained unauthorised access to certain files between mid-May and July 2017. SHOCKINGLY - the "security...

read more

- Get In Touch With Us -

Data security should be addressed simply and effectively by firstly understanding what you need to protect and why, then how it should be protected

For an initial confidential discussion contact me using the form below

12 + 6 =