Policy pile up creates user uncertainty

This blog was written after recently working with different companies on their Information Security Management Systems (ISMSs).  The ISO27000 standard – the Overview and vocabulary part of the ISO27nnn series – defines an ISMS as consisting of “policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its… Read More

CNIL – causes of reported data breaches (May – October 2018)

The CNIL (the French Data Protection Authority) received 742 notifications of personal data breaches (and see the original report in French) that affected over 33 million individuals located in France or elsewhere. 695 related to confidentiality breaches. The accommodation and food services sector had the highest number of breaches – 185. This is due to a specific case… Read More

It was bound to happen…was it a problem?

  Along with death and taxes, one of the things that will happen to almost everyone in the UK is losing access to a vital lifeline, aka your mobile phone. And when that happens, are you going to be in for a frantic four-hour session to get back to normal, or will it be relatively easy. … Read More

Perception vs Reality of cyber crime

Would you consider your house as secure if it had been broken into in the past year, and the police had not caught the gang that was breaking into most of the other houses on your street? Probably not. Compare this to businesses and cyber crime. A recent report indicates there is a disconnect between the reality… Read More

Is cyber crime a threat to SMEs?

With reports of SMEs averaging four cyber crimes every two years and 10% of the population being victims in the past year, it has to be seen as a real threat. But what does this actually mean to a business? The first thing to do is get beyond jargon like phishing, ransomware and DDoS attacks. Cyber… Read More

Why keeping information secure is much more than an IT issue

When I ask business owners what they are doing to keep their business information secure, the vast majority say it is an IT issue and I should talk to their IT team or the company used to maintain their IT systems. But what about dealing with risks from your staff, lack of adequate physical security or keeping… Read More

Is that the drip, drip, drip of your data?

It may seem obvious, but some businesses don’t appreciate that securing information means you need to know what you have and where it gets stored. Not so long ago you knew that information stored electronically would be held on servers within your building(s), at a secure data centre or on backups held by a trusted… Read More

We are Cyber Essentials certified

We have obtained Cyber Essentials certification to prove our compliance with cyber security best practice. The Cyber Essentials scheme is part of the UK’s National Cyber Security Programme. We can help other companies prepare for Cyber Essentials certification. Why should SMEs get certification? With an increasing number of cyber threats, the British government and most… Read More

Public WiFi good practice

Keeping up-to-date with emails and social media is an essential part of running a business. When there is no access from our phones, or a faster connection is needed, we switch to WiFi. In many cases, this will be a public WiFi network rather than a private one. Once you are connected the risks of… Read More

Are we closer to having devices that need charging less frequently?

For many people, each day involves a ritual recharging of their phone and other mobile devices. Recent news items brings us hope of less frequent charging with improvements to batteries and operating system changes.  Here is a selection of what the future could hold. Apple iPhone Optimising iOS 9 to run smoother and faster with lower… Read More