Why Encryption is the Best Strategy

Data protection, wherever it resides, must form the core of companies’ security systems.

Encryption, in which information is converted from readable format into one that obscures its meaning from those without the authorisation or ability to decipher it, has long been used to protect sensitive information from prying eyes.

Data security as a pressing concern

Read more

Why passwords must be taken seriously

So, how can businesses ensure that their employees use the best password security to guard their data safely?

The Friend Finder Network hack, the largest data breach of 2016 that exposed more than 400 million user accounts, has, once again, highlighted the issue of passwords.

Passwords continue to be the bane of our digital lives. We tend to use simple, memorable passwords that any ‘wannabe hacker’ can break. If you then try harder and go for a more complex solution it often gets forgotten or, worse still, written down. So, how can businesses ensure that their employees use the best password security to guard their data safely? Read more

Challenges of complying with the Investigatory Powers Act

Despite opposition by civil liberties groups and technology companies, the UK government has passed the controversial Investigatory Powers Act, adding a host of security and contingency requirements that UK businesses need to consider

On 29 November 2016, the Investigatory Powers Act 2016 was given royal assent and enshrined in UK law. The act is designed to consolidate the various surveillance powers that were spread across different legislation and update them for the 21st century, while replacing the previous three surveillance commissioners with a single oversight body

Read more

Blackmail for a digital age ……

Ransomware is a particularly malicious form of malware that gains access to a user’s system and then proceeds to prevent them from accessing their own data. In some cases, the files on the system are encrypted so as to be irretrievable without the key and, in others, access is simply denied to the device’s owner. In both situations the hacker will demand a ransom is paid to un-encrypt the files or have access given back to the user. You could say it is traditional blackmail revolutionised for a digital age.

Ransomware is generally distributed via email, with the recipient inadvertently clicking on a malicious website link, or opening a harmful attachment.

Read more

The Danger Within……

While many security professionals and budgets are focused on threats from external actors, the insider threat looms large. According to Vormetric, 89% of organisations are at least somewhat vulnerable to insider attacks. It states that privileged users are considered to be the most dangerous, primarily owing to their access to systems and information considered to be particularly sensitive.

This is echoed by research from those Ponemon Institute, which found that almost half of respondents believe the insider threat to be growing.

The insider threat can come from those inside the organisation that have had their credentials compromised, or are negligent or malicious. Increasingly, external actors are looking to gain a foothold on the network through social engineering exploits, often stealing credentials of a victim within the target organisation.

Read more

Our Data Security Predictions for 2017

‘this year has been a year of high profile hack after high profile hack. It seems we still are to learn the lessons of the vital role of data security procedures in order to keep ourselves safe’, says Colin Tankard, Managing Director of data security company, Digital Pathways. Here, Tankard outlines his predictions for the data security world in 2017.

Read more

Are you classifying your data?

All organisations handle information that is sensitive and confidential, which provides them with a competitive advantage. The need to secure information is more pressing than ever, with increasingly prescriptive mandates that demand protection for information and, increasingly, sophisticated criminals for whom such information is a goldmine, writes Colin Tankard, pictured, Managing Director, Digital Pathways, a data management product company. Read more

Opportunities and Threats. The downside of Faster Connectivity

Alongside more efficient network services must come increased vigilance, education, and higher levels of security systems.

The UK Chancellor’s investment plans for the country’s digital infrastructure and fibre networks set out in this week’s Autumn Statement is good news for those involved in the development of smart cities but should also come with a warning believe some members of the community.

Read more

Harlow Firm Wins Top Communications Award

Digital Pathways wins Channel Product of the Year (software) at the prestigious Comms Business Awards for its nSuite software package. The award was presented to Jacqueline Wilkinson & Colin Rumsam by Sir Lenny Henry at the Lancaster London Hotel on the 16th June 2016.

Click here to read full article in Essex Life Magazine

Read more

Smart Buildings Need Joined-Up Security

Today, much discussion in the technology world revolves around the Internet of Things (IoT), where billions of things will be interconnected over IP networks. Gartner estimates that, as of 2015, smart homes and commercial buildings made up 45% of the IoT.

Smart Buildings are often run using building automation systems that are used to centrally control areas such as heating, ventilation, air conditioning, lighting and lifts.

Read more