Do you know if your emails are secure?

Of all the millions of emails sent each day, how many senders even think about whether their messages are secure? Traditional email has the confidentiality level of a postcard – anyone involved in its transport can easily read it. Lack of care becomes even more of a problem when the sender is attaching confidential or […]

Cybersecurity: What are Insurers Looking For?

Nicola Laver investigates how low firms can satisfy their insurers that their cybersecurity and anti-commercial crime strategies are robust. Given that research has shown that cyberattacks on UK  law firms increased by nearly 20% between 2014-2015 and 2015-2016, robust cybersecurity strategies are vital issues; furthermore, 73% of the top 100 law firms in the UK […]


Cyber security is generally agreed upon as a protection of electronic information, the ICTs that support cyberspace. It is also protection in a number of spaces including personal, professional, and even national. Sometimes, all three of these can interconnect into a cyber nightmare because one element was vulnerable to being attacked, which in turn had […]

Learning from a cyber attack

New research also reveals that two thirds of UK businesses have no official ransomware policy to guide employees in the event of an attack. Organisations must protect and educate their users, says Tankard There are many reasons organisations do not follow the latest software releases but what seems to constantly fail, is the “thought process” […]

Are You Protecting Your Documents With A Digital Signature?

Protecting digital documents and being able to verify that the sender of a file is, in fact, who they say they are, is fast becoming a major concern for many businesses. Whether receiving a document from a business partner, or downloading software from the Internet, the ability to verify the integrity of a file is […]

How log management can protect your systems

Every PC and server you use will keep an audit of its activity, which gives you valuable insight into the behaviours of its users. Log management is an essential tool in the battle against cyber-crime. It might not be as glamorous as anti-malware software, or the use of honeypots, but it can be the single […]

The eSignature Comes of Age

In recent years, the use of digital or electronic signatures has rapidly increased in an effort to streamline all types of business transactions. The eSignature can not only be used as an actual certifiable signature, just as we did with a pen, but can also be used to encrypt the contents of a document, thus […]

Encryption as the Cornerstone of Big Data Security

Big data refers to huge data sets that come about through the phenomenal growth being seen in the volume of information collected, produced, analysed, shared and stored by organisations. By analysing big data sets, valuable insights can be gained into how patterns of data are associated to enable better-informed decision-making, which can aid in competitiveness […]

Digital Security Solutions for SME’s

Often a hacker can remain on your system for months, gathering data, exploiting your network and gradually making their way up the chain. The small to medium enterprise (SME) owner tends to think they have little or no data that is at all valuable and, as a result, issues of digital security are therefore not […]