Newcastle’s Omlis signs five year partnership with Digital Pathways

Newcastle-based mobile payments technology provider Omlis have announced their partnership with Digital Pathways, a provider of data security and leakage prevention services in the UK.

A five year partnership strategically focused on delivering Omlis’ mobile encryption architecture across key market sectors in the UK, Digital Pathways committed to a partnership with Omlis based on the increasing demand for enhanced endpoint focused security solutions.

Read the full article 

cw logo

The Cost of Security for UK Business

Computer Weekly

The draft Investigatory Powers Bill to increase surveillance is already controversial, but there are growing concerns over the potential economic consequences.

First announced during The Queens Speech in 2012, the Draft Communication Data Bill, as it was known then, was met with widespread criticism, before it was ultimately dropped during the coalition government in 2014.

With the Conservative party winning a majority government in the 2015 general election, the so-called “Snoopers’ Charter” has once more come to the fore. It was revealed during the Queen’s Speech on 27 May 2015 that a new Investigatory Powers Bill would “modernise the law on communications data”.

Read the full article

Secure Voice Communications Placement


Businesses are aware of the importance of securing data held on corporate networks and beyond. But too often they overlook the importance of securing their communications and voice networks says Colin Tankard, MD of Digital Pathways.

The convenience and reduced cost of making calls over the internet appeals to businesses large and small. Voice over IP (VoIP) to give its technical name ranges from modest Skype apps on smartphones right up to enterprise wide, fully featured unified communications networks.

While conventional voice calls can obviously be bugged or hacked many users of VoIP forget that a data based voice system is also vulnerable from cyber attacks. Unauthorised access to VoIP data servers can even provide a backdoor into the company’s main networks if not protected.

Yet, in my experience it’s not unusual for VoIP servers to be left unprotected against hackers searching for and finding vulnerabilities. Why is this? Is it ignorance of the dangers or a reluctance to invest in VoIP protection?

Read the full article

Internet of Things issues

Professional Security Magazine –

In the Internet of Things (IoT), potentially billions of devices will be connected using machine-to-machine technology enabled by the internet, writes Colin Tankard, Managing Director, Digital Pathways.

This will encompass a wide variety and volume of interconnected ‘things’, including smart buildings and cities, physical security controls, cars, planes, medical equipment and devices, consumer devices and industrial control systems.

According to a recent survey by the SANS Institute covering organisations of all sizes, 66% of respondents are either currently involved in, or are planning to, implement IoT applications involving consumer devices, such as smartphones, and smartwatches and other wearables. Smart building systems are increasingly being implemented as operations management systems get connected to networks.

Read the full article:

Time to start practising some Internet common sense.

Business Matters Magazine

There is no doubt the Internet has transformed our lives and will continue to do so. For many of us it’s hard to remember how we did business before the web changed everything.

Some of us even used to write letters and make phone calls – remember those! Meanwhile an entire generation has grown up knowing no other way of doing business.

Yet perhaps we have become too relaxed. While we gain from the convenience and new business opportunities the Internet has given us, another group has benefitted also: cyber-criminals.

Cyber crime has reached unprecedented levels across the world. High profile hacks of companies like US retailer Target and Sony Pictures has demonstrated the resources and sophistication of organised gangs and the impact they can have on the long-term stability of even the biggest organisations. Read the full article here

How Secure is Your Building

Network Security Magazine

Buildings today often incorporate the use of a building automation system, which provides automated centralised control of systems such as heating, ventilation, air conditioning and lighting. Buildings that employ such systems are often referred to as smart buildings. According to Automated Buildings, a smart building is defined as one that incorporates “the use of networked technology, embedded within architecture to monitor and control elements of the architecture for exchange of information between users, systems and buildings.” read the full article here


How will new internet surveillance measures affect business in France?

ZDNet article By Frances Marcellin
A shared digital space requires trust, so why has the French government introduced stricter online surveillance laws and how will it affect business users of online technologies such as the Cloud?
Since the tragic attack on satirical newspaper Charlie Hebdo’s editorial team in Paris on 7 January 2015, the French government has been seeking greater support from technology firms to improve online surveillance. During his speech in the wake of the attacks, Manuel Valls declared that France was “at war with terrorism” and stated that “strengthening measures” would soon be introduced that “relate to the internet and social networks”. Read the full article here

Does the cloud offer an operational advantage to small businesses?

Business Matters Magazine

The cloud is everywhere, changing the way we live. Increasingly the television and movies we watch are delivered from cloud based applications like Netflix, BBC iPlayer and Sky’s Now TV service. Many of us listen to music streamed from the cloud on our mobile.

Web based services like Google Docs and Microsoft Office 365 deliver office applications that once resided on PCs, along with automatic backup and storage of documents. They also offer very useful sharing capabilities for collaborative working. For very small businesses the low cost and simplicity on offer are highly attractive. Read the full article here

Vormetric release Insider Threat survey

Our Partner, Vormetric, have just released the results of their survey on how companies feel about the Insider Threat. They interviewed 818 leading companies around the world and their finds make very interesting reading.

What is common is every company sees a major threat from within the organisation, whether that be from employees, contractors or partners. One aspect which was highlighted is the issue of system administrators and their abuse of privileges.

See the full presentation: Inside Threat Survey 2015 web version.

Business Today on our Top Tips

Top tips for businesses to battle cyber attacks in 2015.

In 2014 there was a significant increase in reported cyber hacks and related financial losses either due to prosecution, loss of reputation and even job loss due to non reaction to an event.

According to Colin Tankard, managing director at data security specialists Digital Pathways, 2015 will undoubtedly see a further escalation of cyber attacks.

Tankard talked to Business Today about some of the biggest cyber changes predicted for 2015 and provided top tips to help businesses of all sizes tackle the digital challenges in the upcoming year. Read the full article