Cyber Security in the Utility Sector

The modern world often grinds to a halt when there is an interruption to any of the services provided by the utility sector of the economy. For example, when the electrical supply fails, or if a city transport system is brought to a halt with no trains or buses in operation. Even something as local […]

Securing Your Digital Identity

Many people have experienced the gut-churning feeling when they check their credit card statement and see unfamiliar transactions or log on to a social media account and see posts they didn’t make. That mobile phone SIM bought in a country they’ve never been to, and the Facebook post with a link to a phishing site […]

Veracode And Code Security

It’s almost a decade since Marc Andreessen wrote his influential “Why Software Is Eating the World” article in The Wall Street Journal. In the article he outlined how software systems were, and would continue to, disrupt and replace traditional business models with layers of software and applications on the web and mobile devices. His prediction […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In times of disaster or disruption, employees may need to work […]

8 Top Tips for Keeping Your IT in Great Shape

In one way or another, Information Technology (IT) is an integral part of any business and we often don’t realise how much we rely on it until it’s non-operational. When such a thing occurs, business day-to-day operations are slowed and can even grind to a halt. Luckily, you can reduce the stress and damage that […]

Not A Very Merry Christmas – Looking Back to 1987

Christmas Tree EXEC was the first widely disruptive computer worm which paralysed several international computer networks in December 1987. Christmas Tree EXEC was an early mass mailing worm coded by an unnamed student from Clausthal University of Technology. This was the first widely disruptive computer worm which paralysed several international computer networks including the European Academic Research […]

TENGEN | GAME OVER! – LOOKING BACK TO 1987

Atari Games was formed from Atari’s arcade division. They could use the Atari name on arcade releases, but not on console or computer games. When Atari Games wanted to enter the console-game market, it needed a new label that did not use the Atari name. Enter TENGEN! Going back to 1987… In 1987/88, TENGEN released its first […]

EVERY LITTLE HELPS- LOOKING BACK TO 1987

“Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From 1983 to 1987 Chinese and German teams collaborated […]

GOING TRULY GLOBAL – LOOKING BACK TO 1987

Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From 1983 to 1987 Chinese and German teams collaborated […]

Business Continuity – Calling in the Experts (Part 2)

Before we get started, there’s a lot going on with clear crypt this month, They’re having a competition at the moment to win one of their ClearCrypt Secure 8GB Encrypted Storage Devices, to be in with a chance of winning click hereAlso for a limited time only their having 10% off their MSATA range of products, to […]