GDPR

The second of the 5 controls is Secure configuration, which involves making device and software settings as secure as possible. This process requires a very proactive approach to your IT management.   The default security settings ARE NOT the most secure It is often the case that programmes...

Firewalls are one of the 5 key components required to achieve the Cyber Essentials certification. Let us take a look at how firewalls work, the different types and the various ways to configure them to ensure you satisfy the requirements of Cyber Essentials. Before we...

Cyber Essentials is a government-backed scheme designed to help businesses protect themselves from some of the most common online threats. Since its introduction in 2014, 30,000 businesses have been awarded the highly regarded certification. In order to achieve a pass and get the certification, you must...

The Cyber Security Industry - What are they trying to achieve? Everyone in the cyber security industry (including us) are focused on the same goal. That goal is simple, to keep businesses secure from the huge variety of threats that exist in the cyber wilderness. This...

Did you know that over 33% of all businesses know that they are not GDPR compliant? That's the companies that know what the new data protection law's are!!! Some still  have no idea what the General Data Protection laws (GDPR) are?, if they are compliant?...

A finding recently unveiled how someone managed to hack and acquire 773 million email addresses as well as 21 million unique passwords (the biggest data breach ever). It is astonishing that one person could get hold of this amount of data. It seems a scary thought...

For some companies,2019 heralded an escape from what had been a bad year, and not necessarily because of poor results or mismanaged finances. Ticketfly, Facebook and even Google fell victim to cyber-attack in 2018, leaking vast amounts of data including  addresses, telephone numbers, bank and credit...

Why Do We Need Cyber Essentials? We live in a world where cyber-attacks are now a lucrative business model and used by criminals and states.  This is partly due to speed of growth and our increasing reliance on connected technologies, both personally and professionally. The risks keep...

Cyber Security Breaches Survey 2017 The Cyber Security Breaches Survey measures how well UK businesses are approaching  cyber security, and the level, nature, cost and impact of cyber attacks on businesses. For more a more detailed look at the Cyber Security Breaches Survey 2017, Please click here. ...

Uber, Sage, Tesco Bank, Experian, this isn’t a who’s who of global brand names and successful companies, but just a few of the companies hacked in 2017. Data breaches are becoming commonplace and when these happen, the effects on customer confidence and the brand can be...