Data Security – David Higgins, CISSP
GDPR in 5 minutes
Doom mongers predicting impending disaster have heralded the new data protection laws which come into force on May 25th 2018 in the UK – the General Data Protection Regulation (GDPR) is not just a UK based law, it is global and will affect any company which offers...
IoT – Botnet attacks again – but bigger and better
Basic steps to Protect your IoT Devices from being Hacked Anyone who remembers the Mirai botnet, which caused huge problems in 2016, may be forgiven for thinking steps had been taken to prevent a similar disaster. However, another mysterious botnet, dubbed the...
Send them to Jail
Forgive me as I'm typing this with my tongue in my cheek ...... Apparently, some unknown hackers managed to exploit a "security flaw" on the Equifax systems and gained unauthorised access to certain files between mid-May and July 2017. SHOCKINGLY - the "security...
365 days to go – GDPR
The GDPR applies to processing carried out by organisations operating within the EU; and applies to organisations outside the EU that offer goods or services to individuals in the EU
EternalRocks – another worm that’s predicted to be worse than WannaCry
Another network worm dubbed EternalRocks is making the news this week as the successor to the WannaCry ransomware
WannaCrypt – Latest – Monday 15th May
WannaCrypt Update: Everyone will probably have heard about the recent Ransomware attacks on Friday and over the weekend which have largely affected the NHS in the UK (Although 300,000 infections in over 150 countries have been reported). Those at exceptional risk are...
Time to Change the Laws?
Time to Change the Law on Data Responsibility? Is it time to change the laws relating to the responsibility of holding personal data? ...... "script kiddies" (those who hack from their bedrooms at night through sheer boredom) should not take the full...
Why is Cyber Security so Important?
An increasing number of high profile data breaches have taught us that how a company looks after their information and manages any incidents can make or break an organisation.
- Business Articles -
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
- Personal Privacy Articles -
Be Invisible Online
Leave No Trace on the Web Boot any device with this thumb drive inserted - you have email and browsing functionality, a full suite of office programs, security options along with an encrypted file storage area
Encryption
Intellectual Property represents original work that can be lost, stolen, or hacked from a phone, tablet, laptop or PC
Adobe Flash – Critical Patches Released
Urgent Adobe Flash Patches released for ALL operating systems
.
- Cyber Protection Articles -
EU Data Protection Reform
A major change in the Data Protection laws which will effect every business
Successful Cyber Attacks Against MPs
… computers were breached while using public Wi-Fi
Social Engineering – Cyber Attacks
“Social engineering” skills are highly developed and are specifically focused