Staying PSD2 Compliant with QWAC

A new EU directive related to security is due to go into effect on the 14th of September 2019. It is called the Payment Service Directive 2 (PSD2), and it is focused on the banking and financial technology sectors. As the name suggests PSD2 is the second implementation of EU wide banking regulations, and it […]

Why you need to use a Password Manager

The consequences of poor data security just got a lot more severe, with the UK Information Commissioner’s Office announcing that it intends to levy a £184m (€205m) fine on British Airways for a data breach that compromised the personal data of half a million customers in 2018. It has been clear for a while now […]

GDPR One Year On: What Have We Learned?

Saturday the 25th of May marked a year since the EU General Data Protection Regulations (GDPR) came into force in the EU. Most member states have adapted their national data protection laws to be GDPR equivalent (Portugal, Greece, and Slovenia are in the final stages) and the rules governing how data is collected, stored and […]

Secure Email and Accidental Data Leakage

Data breaches are still a threat for all organisations and with the advent of GDPR in the EU, the implications if one occurs go beyond the reputational into the potentially significant financial area. Most of the focus on preventing data breaches is on thwarting attacks from outside, but there is potential for data leakage from […]

Password Security Attacks

Sticky notes are a wonderful invention. They have lots of useful uses in the office, from quick lists to task descriptions on Kanban boards for agile development teams. Like all ideas, they can also be used for things that are not so good. Such as a convenient way to store passwords for IT systems. The […]

The Evolution of The DDoS Attack

It’s vitally important for businesses and organisations of all sizes to ensure that their Web sites and other Internet services are available at all times. Whether a web site is the source of revenue by providing an online store or only provides information and contact details for prospective clients, it is damaging both in reputational […]

Making the Move from Citrix

“No one ever got fired for buying…”   We’ve all seen this phrase used in various contexts when looking to procure an IT solution or service. Depending on your age you will have heard in its original form when referring to IBM, or more recently it may have been Microsoft, Cisco, or some other dominant […]

Veracode And Code Security

It’s almost a decade since Marc Andreessen wrote his influential “Why Software Is Eating the World” article in The Wall Street Journal. In the article he outlined how software systems were, and would continue to, disrupt and replace traditional business models with layers of software and applications on the web and mobile devices. His prediction […]

Beware Ransomware!

“The files on this computer have been encrypted! You have 96 hours to submit payment, otherwise your files will be permanently destroyed!” The message no one wants to read, you’ve been hit with RANSOMWARE. Such attacks can be costly for businesses as ransomware infects a computer, blocks access to computer files and demands that money […]

SSL Certificates – 5 Benefits to your Online Business

Online is a multi-Billion Euro marketplace, where there is money there is also crime! One of the first lines of defence for any online presence is your SSL (Secure Sockets Layer) certificate – electronic files used to identify people and resources over Internet. Serious websites must implement SSL security to protect themselves and users, web […]