Authentication Systems – The End of Passwords?

There are many ways in which the internet has made our lives simpler and expanded our horizons. It allows us to connect easily with people from across the globe, organise our banking transactions wherever in the world we are and buy whatever we need whenever we need it with just the touch of a button. Read more


Secure Voice Communications Placement


Businesses are aware of the importance of securing data held on corporate networks and beyond. But too often they overlook the importance of securing their communications and voice networks says Colin Tankard, MD of Digital Pathways.

The convenience and reduced cost of making calls over the internet appeals to businesses large and small. Voice over IP (VoIP) to give its technical name ranges from modest Skype apps on smartphones right up to enterprise wide, fully featured unified communications networks.

While conventional voice calls can obviously be bugged or hacked many users of VoIP forget that a data based voice system is also vulnerable from cyber attacks. Unauthorised access to VoIP data servers can even provide a backdoor into the company’s main networks if not protected.

Yet, in my experience it’s not unusual for VoIP servers to be left unprotected against hackers searching for and finding vulnerabilities. Why is this? Is it ignorance of the dangers or a reluctance to invest in VoIP protection?

Read the full article

Internet of Things issues

Professional Security Magazine –

In the Internet of Things (IoT), potentially billions of devices will be connected using machine-to-machine technology enabled by the internet, writes Colin Tankard, Managing Director, Digital Pathways.

This will encompass a wide variety and volume of interconnected ‘things’, including smart buildings and cities, physical security controls, cars, planes, medical equipment and devices, consumer devices and industrial control systems.

According to a recent survey by the SANS Institute covering organisations of all sizes, 66% of respondents are either currently involved in, or are planning to, implement IoT applications involving consumer devices, such as smartphones, and smartwatches and other wearables. Smart building systems are increasingly being implemented as operations management systems get connected to networks.

Read the full article:

Cyber Crime – How to deal with the Threat

The digital world is an enigma to many, a mysterious space that is dominated by innovative organisations and unscrupulous cyber criminals. Each side is in a constant struggle between performing cybercrime and preventing its damage, a battle played out across a global stage and one that is worth huge sums to both those who benefit and those who suffer. Read more

Strong Encryption Software – Defending Free Speech or Enabling Crime?

The United Nations is putting pressure on governments looking to relax encryption security by citing the basic human right that people have to anonymity. In a recently published report the UN have defended the use of strong encryption as a way of protecting freedom of speech in the digital age. From journalists and protestors, to citizens who expect privacy online, encryption gives the opportunity to share opinions and debate without fearing exposure. But does protecting this right outweigh a nation’s security? By protecting freedom of speech are we also protecting paedophiles, terrorists, drug dealers and financial criminals? Read more