Entries by digitalpathway

How to improve security against email attacks and for GDPR compliance

About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies It is not unusual for emails to be used for arranging payments or for submitting identifying documents. “Legal services seem to do 40% of their work on […]

Computing Security Awards 2017

Digital Pathways are very proud to announce, that following nominations for the Computing Security Awards 2017, we have been confirmed as finalists in the following categories: Encryption Solution of the Year – (nCrypt – Managed Encryption Services) SME Security solution of the Year – (nCrypt – Managed Encryption Services) New Product of the Year – (nSuite […]

Data: When is it personal?

Data protection is not fundamentally a data issue, but a human rights issue. As such, data protection legislation such as the General Data Protection Regulations (GDPR) always relate to processing personal information. To understand your legal obligations, it is necessary to understand what is considered personal data. This is an area that can cause confusion. An […]

A Personal Information Data Breach Story

Our director, Colin Tankard, recently identified a personal data breach in action when buying a new car. In the process of buying the car, Colin received poor service from a main dealer and when he complained about this, he didn’t receive a response. He did receive an email from the car manufacturer’s marketing team inviting […]

How Can You Protect Your Business Against Malware?

Ransomware, viruses, and malware. No business wants to find themselves the victim of a cyber-attack. Often these malicious pieces of software enter the network via a backdoor attack, allowing cybercriminals to break into the infrastructure without being discovered. Once inside the network, they can lay quiet for weeks or months before activating, making them even […]

PKWARE partners with Digital Pathways to further UK expansion

LONDON, July 18, 2017 /PRNewswire/ — PKWARE, a global leader in data security, and UK-based Digital Pathways, have announced a new value added partnership. Digital Pathways, established in 1997, specialises in data protection and cyber security. The company works with some of the world’s leading companies to ensure the safety of their data and their compliance […]

How to make your email secure

Cybercriminals are intercepting emails between companies and their clients, deceiving customers out of life-changing sums of money and severely damaging the reputation of the organisation. Targeted companies range from solicitors and conveyancers, to builders and traders. In January this year, a charity worker buying his first home had his £67,000 life savings stolen after fraudsters […]

Information Security and the Legal Sector

Safeguarding their interests against cyber-attacks should be a top priority for law firms. Financial loss is rarely the most detrimental issue for businesses where cyber attacks are concerned. The legal sector is an especially attractive target for cybercriminals due to the wealth of sensitive information held by law firms. A successful cyber-attack has the potential […]

Are you ready for the General Data Protection Regulations?

Data holding is no longer something an organisation can take lightly, it needs serious thought and processes put in place. The General Data Protection Regulation is the process by which the European Parliament intends to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside […]

Secure Data Storage in a Cloud-Based Era

Is there an asset more valuable than your company’s data? The need to keep off-site back-ups, seamlessly collaborate with others, and access data from any location has led to vast amounts of critical data being stored in third-party cloud-based services. Your confidential data is such as Word documents, PDFs, spreadsheets, emails, contact lists and databases. […]