How will the changes brought in by GDPR affect your business?

In the UK, The Data Protection Act of 1998 has been the sole regulatory legislation that companies based here have had to comply to. An Act of Parliament, it was introduced to protect the personal data of British citizens, by outlining exactly what businesses must do when processing their information.

On the 25th May 2018, the Data Protection Act will be replaced by the EU General Data Protection Regulation (GDPR). This is a Europe-wide set of compliance obligations, rules that will again stipulate what must happen when an organisation handles and processes data. It is widely agreed that the GDPR is a far more robust set of regulations than what is currently in place, with the main changes in the areas of child consent, privacy by design and data breach notifications.

The Importance of Baseline Security

Understanding your company position in terms of digital security is vital to knowing whether you can and will be protected moving forward. Although having layers of security to protect you against the multitude of threats a company can face is preferable, there is a bare minimum standard that you should be aiming for.

That bare minimum would be a Gap Analysis of your current situation. This is a method of assessing the differences in performance between a business’ information systems or software applications, to determine whether business requirements are being met and, if not, what steps should be taken to ensure they are met successfully. The first step is always to understand the present and isolate the issues that must be addressed moving forward.

The Threat of Ex-employees in Digital Security

When we talk about the insider threat, and it is a topic that is very prominent in the digital security world at the moment, we tend to think of it in terms of rogue employees. People inside your business who are either actively looking to damage your organisation, or are simply naïve to the risks of what they are doing. At Digital Pathways, we would like to talk about the equal threat that ex-employees pose, or at least, how the accounts they leave behind can still cause damage. 

How Ransomware Attacks Might Affect Smart Buildings

Ransomware has become a decidedly ‘trendy’ cyber-attack topic for the media to cover. We looked at it ourselves earlier this year too, in our post on ‘how to deal with ransomware’. In it, we discussed how this particular form of cybercrime can affect people, and what is at risk. We touched on the turmoil that hackers have caused in hospitals and schools, as well as how businesses should look to educate their staff on preventative measures.

The Potential Risks of the Internet of Things in our Homes

The emergence of the Internet of Things (IoT), and the dawning of the ‘Interconnected Home’, is set to revolutionise the way we live our lives.

Connectivity between Internet-enabled devices will allow for previously unthought-of communication, as physical objects perform actions that see them interact with their environment. The possibilities are vast, with electronic appliances in the home embedded with the same technology you would likely find in your phone, or even your car.

How Log Management Can Help You Protect Your Systems

Log management is an essential tool in the battle against cyber-crime. It might not be as glamourous as anti-malware software, or the use of honeypots, but it can be the single most important way of preventing a potential hack. It is effectively the gathering of information from your systems. Every PC and server you use will keep an audit of its activity, which gives you valuable insight into the behaviours of its users. You are able to track exactly who logged in at any given time, and where exactly they were accessing.

GCHQ and the Smart Meter Fiasco

Earlier this year, a story was brought to our attention that sent reverberations around the office. As digital security experts, we believe that tightly securing electronic items is an absolute must, and that any company or organisation releasing technology should have a plan in place from the outset. Imagine our surprise when articles regarding the Government Communications Headquarters (GCHQ) surfaced, reporting that the intelligence agency had been forced to intervene in the roll-out of Smart Meters, due to the use of a single encryption key.

The Increased Risk of Hacking Apple Macs

It is estimated that Microsoft have around 90% of the market share when it comes to operating systems. This statistic may be slightly misleading though, as it appears to be based on purchases. It doesn’t necessarily take into account the usage levels. Although most new PC’s have Microsoft windows already installed for example, it doesn’t mean that the user doesn’t install something else. Apple, the main rival to Windows, can also argue that their devices have a longer lifespan, and therefore aren’t accurately represented. Whatever the true reflection, what is clear is that having a far inferior market share isn’t protecting Apple users from hackers any more.

Security for Smartphones

In an increasingly technology driven and mobile world, our reliance on our smartphones is growing. They are getting smarter, sleeker and able to perform more and more actions that make them essential to the day to day running of our lives. We can run businesses from our phones, access and distribute funds from various banking apps and store databases. We put in private details without a thought, sending information out into the world that in other situations we keep completely confidential.

The Gartner Security and Risk Management Summit 2016

The Gartner summits are some of the most renowned and highly valued conferences in the world. As a leading information technology research and advisory company, Gartner offer incredible insight into practically all areas of IT. The recent Security and Risk Management Summit 2016 was no exception, addressing the latest cybersecurity threats and introducing flexible new security architecture and governance strategies that can be implemented to combat them.