GDPR One Year On: What Have We Learned?

Saturday the 25th of May marked a year since the EU General Data Protection Regulations (GDPR) came into force in the EU. Most member states have adapted their national data protection laws to be GDPR equivalent (Portugal, Greece, and Slovenia are in the final stages) and the rules governing how data is collected, stored and […]

Secure Email and Accidental Data Leakage

Data breaches are still a threat for all organisations and with the advent of GDPR in the EU, the implications if one occurs go beyond the reputational into the potentially significant financial area. Most of the focus on preventing data breaches is on thwarting attacks from outside, but there is potential for data leakage from […]

Password Security Attacks

Sticky notes are a wonderful invention. They have lots of useful uses in the office, from quick lists to task descriptions on Kanban boards for agile development teams. Like all ideas, they can also be used for things that are not so good. Such as a convenient way to store passwords for IT systems. The […]

Beware Ransomware!

“The files on this computer have been encrypted! You have 96 hours to submit payment, otherwise your files will be permanently destroyed!” The message no one wants to read, you’ve been hit with RANSOMWARE. Such attacks can be costly for businesses as ransomware infects a computer, blocks access to computer files and demands that money […]

Shirley Bassey “I AM what I AM”….Or is she?

I don’t want to make too many assumptions here, but I assume most of you have heard of Shirley Bassey? To be more precise Dame Shirley Veronica Bassey, born: 8 January 1937 (age 81 years), famous for Goldfinger · 1964 and of course I Am What I Am · 1984. But when it comes to […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In times of disaster or disruption, employees may need to work […]

Competition Time!

Click Here to Enter our competition to be in with the chance to win one of our brand new ClearCrypt Secure 8GB Encrypted Storage Devices. It is a Slim, Secure and Reliable Storage device which is software free, ensuring multi platform support while on the move.Real-time AES 256bit encryptionSoftware freeAluminium CasingTrue Hardware EncryptionSuper Speed USB 3.0Compact

Data Deposit Box – Guardians Of Your Galaxy!

Beside individuals, an association’s most important resource is it’s DATA! In our own  world, regardless of how large or little, our DATA is vital… it supports our clients, it educates our staff, it makes us a profits and it protects us. It’s key that we guard it! I’m certain you have heard of or, maybe even, […]

The Belts And Braces Approach

Going ‘belt and braces‘ is a double assurance against having one’s trousers fall down. In today’s digital age, if we think of trousers as your organisation’s data, then a ‘belt and braces‘ approach is it’s storage. I don’t think I need to say too much about the rise of cyber risks!       ·        In […]