A Personal Data Breach Story

Our director, Colin Tankard, recently identified a personal data breach in action when buying a new car.

In the process of buying the car, Colin received poor service from a main dealer and when he complained about this, he didn’t receive a response.

He did receive an email from the car manufacturer’s marketing team inviting him to complete an online survey about his experience and, like many surveys, offered the chance to be entered into a competition.

How Can You Protect Your Business Against Malware?

Ransomware, viruses, and malware. No business wants to find themselves victim of a cyber-attack. Often these malicious pieces of software enter the network via a backdoor attack, allowing cybercriminals to break into the infrastructure without being discovered.

Once inside the network, they can lay quiet for weeks or months before activating, making them even harder to detect. All the while it is moving around your network, seeking to find super-user credentials, elevate its privileges, and access vital data.

So how can you stop something you don’t even know about?

PKWARE partners with Digital Pathways to further UK expansion

LONDON, July 18, 2017 /PRNewswire/ — PKWARE, a global leader in data security, and UK-based Digital Pathways, have announced a new value added partnership.

Digital Pathways, established in 1997, specialises in data protection and cyber security. The company works with some of the world’s leading companies to ensure the safety of their data and their compliance with applicable regulations.

How to make your email secure

Cybercriminals are intercepting emails between companies and their clients, deceiving customers out of life-changing sums of money and severely damaging the reputation of the organisation.

Targeted companies range from solicitors and conveyancers, to builders and traders.

In January this year, a charity worker buying his first home had his £67,000 life savings stolen after fraudsters hacked into emails sent between him and his conveyancing solicitor. Last year a London couple transferred over £25,000 to a fraudster posing as their builder after receiving a genuine-looking invoice, for an amount they were expecting, from a copycat email address.

Information Security and the Legal Sector

Safeguarding their interests against cyber-attacks should be top priority for law firms.

Financial loss is rarely the most detrimental issue for businesses where cyber attacks are concerned. The legal sector is an especially attractive target for cyber criminals due to the wealth of sensitive information held by law firms. a successful cyber-attack has the potential to cause long-term reputational damage, with severe implications for the future of the firm.

Information security is a substantial risk for legal sector. Law firms are an attractive target to cyber criminals due to the vast wealth of personal and private information in their possession.

Are you ready for the General Data Protection Regulations?

Data holding is no longer something an organisation can take lightly, it needs serious thought and processes put in place.

The General Data Protection Regulation is the process by which the European Parliament intends to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside of the EU.

The primary objectives of the GDPR are to give control back to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. It was adopted in April 2016 and applies from May 25, 2018, after a two-year transition period. Unlike a directive, it does not require any enabling legislation to be passed by national governments.

Secure Data Storage in a Cloud-Based Era

Is there an asset more valuable than your company’s data?

The need to keep off-site back-ups, seamlessly collaborate with others, and access data from any location has led to vast amounts of critical data being stored in third-party cloud-based services.

Your confidential data is such as Word documents, PDFs, spreadsheets, emails, contact lists and databases.

With hundreds of thousands of businesses placing these documents in cloud-based services like Dropbox or Microsoft One Drive, is it worth asking how secure they are?

Who is the biggest risk to your company’s Cyber Security?

When an employee doesn’t care about cyber security

It doesn’t matter how thorough a business’ protective measures are, employees remain one of the biggest risks to an organisation’s digital security.

In some cases, it is not that employees don’t care about digital security, but that they don’t fully understand it.

An experiment in London’s financial district proved just how much of a risk employees can be to their organisations. CDs were handed out to commuters by employees of an IT skills company and told the disk contained a special Valentines’ Day promotion. In reality, the CDs contained code which notified the IT company how many of the recipients tried to open the CD. Despite clear warnings on the packaging about the dangers of installing third-party software and acting in breach of company acceptable-use policies, several city workers proceeded to run the disk. A major retail bank and two global insurers were among the organisations whose employees fell for the stunt.

Do you know if your emails are secure?

Of all the millions of emails sent each day, how many senders even think about whether their messages are secure? Traditional email has the confidentiality level of a postcard – anyone involved in its transport can easily read it. Lack of care becomes even more of a problem when the sender is attaching confidential or sensitive data. Is it being sent to the correct person? Should the attachment be allowed? Even if it is all right to send, how do you know it was received, when it was read and has it been forwarded? Current system notification is not good enough.

With the General Data Protection Regulation (GDPR) fines looming, now is the time to gain control of emails.

When Familiarity Breeds Complacency – How to Identify Authentic Emails

For many, a daily routine exists from the moment they sit at a desktop or take their first swipe of a tablet. It involves identifying important emails in your inbox and disregarding the spam. In most instances, this is a tedious yet simple task. We click on emails from contacts we know, or from organsiation we trust, and delete those we have no interest in. We look for the familiar and discard the unknown. It is a routine that drains time but a system that in the past has kept us reasonably safe from hackers. Repetitive yet necessary.