Entries by Jacqueline Burton

Cyber-Attacks Are Like The Flu

Cyber-attacks are like the flu, even with an injection, eventually, you are going to get ill. It is always there, lurking, waiting to make your life just that little bit harder. The same can be said of today’s cyber threats.  They constantly change, with malware vectors ever increasing. Many companies are lax, leaving doors open, […]

Insidious Malware And What To Do About It.

Malware is an ongoing headache for IT users and it is a constant race to stay ahead of it.  Recently there has been the storm over the flaw in the Apache Log4J software, which seems to allow hackers to enter code in record-keeping logs, letting them then take control of data. This vulnerability comes from […]

Beware the Russian Hackers!

PRESS RELEASE March 2022 Businesses and individuals alike should be especially vigilant for scams and hacks by Russian vectors at the moment, according to the Managing Director of cyber security company, Digital Pathways. Whilst there is nothing new about the idea of the ‘bad guys’ trying to attack systems by phishing, ransomware, trojan horse attacks, […]

What Is Privileged Access Management?

Privileged Access Management (PAM) refers to the giving, to an IT user, access, or abilities over and above that of a standard user.  This may be in order for them to carry out their roles, for example, an IT administrator, and enables organisations to secure their systems, ensure the confidentiality of data as well as […]

The Work From Anywhere Security Check list

The post-pandemic trend of ‘work from anywhere’ may offer many benefits both to employer and employees alike, but for security teams across the board, it adds a myriad of issues and concerns regarding exactly how data can be kept safe. The ability to be connected on any device with access to every application, anywhere at […]

Why Adopt The Cyber Essentials Programme?

Why Adopt The Cyber Essentials Programme? The government’s Cyber Essentials Programme was developed in collaboration with industry and is intended to help businesses mitigate common, online threats. Operated by the National Cyber Security Centre (NCSC), it was launched in 2014 and has become a key element of excellence for cybersecurity. Applicable to all sizes of […]

Should You Rely On Your Cloud Providers Security?

Should you rely on your cloud provider’s security? Storing data in the Cloud has really only been ‘a thing’ during the last decade but most enterprises now have some kind of cloud presence.  So the question arises, just how secure is your data when there? Many organisations consider that because data is stored in the […]

The Security Conundrum of Artificial Intelligence/Machine Learning

The Security conundrum – Whilst Artificial Intelligence (AI) and Machine Learning (ML) are two buzzwords right now, especially within the broader waves of technological change sweeping through our world under the banner of the Internet of Things (IoT), they are, in fact, different. AI is the concept of machines carrying out tasks in a smart […]

The Case for Streamlining Data

Do you know what data you have? Where it is and who uses it? No, then you need to read this blog! It is not easy to understand where unstructured data exists in the enterprise. There can be massive volumes of documents, spreadsheets, presentations, and emails, all typically scattered about the organisation.  And this represents […]

Is Your Data Being Secretly Manipulated?

So, you are alert to the threat of ransomware but, can you be sure that your data has not, is not and will not be, manipulated by outside forces? More insidious than a ransomware attack is the hack where data or the network is compromised but is secretly hidden from view. The exploit can go […]