Press Room

Press articles relating to everything cybersecurity, data protection, GDPR & compliance, latest breaches & new security solution updates, all offering an insight into the cybersecurity industry

Press Room Articles

2023 Publications

Elite Business

October 2023

Is your email security fit for purpose?

The market for exploiting email security vulnerabilities is, unfortunately, quite substantial. Cybercriminals constantly evolve their techniques to exploit weaknesses in email systems, gaining unauthorised access to sensitive information and wreaking havoc on individuals and organisations alike.
Malware poses a significant threat when it comes to exploiting user devices through email. Once an unsuspecting user opens a malicious attachment or clicks on a harmful link, malware can infiltrate their device, compromising data integrity and potentially spreading further within a network. Understanding how malware exploits user devices is crucial in implementing effective preventive measures.
Read the full article here

Business Cloud

October 2023

Email – the open door to your network for hackers

Email security is a substantial and complex problem that requires ongoing efforts to mitigate risks and protect individuals and organisations.

Email security is a significant and ongoing concern due to the widespread use of email for communication, both in personal and professional settings.

According to Proofpoint, a leading global security provider and the third-largest email scanning platform in the world, approximately 3.1 billion domain-spoofing emails are sent daily, and more than 90% of major cyberattacks are initiated by a single email.

The monetary impact that compromised emails have caused to the global economy is estimated to be $31 billion since 2016.

Read our full article here

Elite Business

August 2023

Is non-compliance the biggest threat to an SME?

SMEs face all the same regulations and challenges as large multinationals and PLCs but often do not proportion their investments back into the business as other larger organisations. This is most evident when we review SMEs’ budgets assigned to compliance and data security.

Read the full article here

Cyber Security Intelligence

May 2023

Encryption is the process by which information is converted from a readable format into one that obscures its meaning from those without the authorisation or ability to decipher it and has long been used to protect sensitive information from prying eyes.

Encryption is invaluable for ensuring that sensitive information that falls into the wrong hands, is prevented from being of use to anyone without the ability to decrypt that information.

Find out why here

Professional Security Magazine 

May 2023

What is enhanced encryption?

Encryption is essential for protecting information that is in storage, such as on a device, in a data-base or in a cloud service, as well as when it is being transmitted—generally referred to as data at rest and data in motion. It ensures that data is safeguarded against loss or unauthorised access.

Access controls should then be applied to all data according to its defined sensitivity……..

Read the full article here

Business Cloud

April 2023

Cyber Essentials Accreditation – Is it worth it?

Obtaining the certification is absolutely worth the time and effort – and should be a standard cyber security requirement for all businesses.

Read why in our full article here

Elite Business

April 2023

How to protect your intellectual property

Protecting your intellectual property (IP) is not compulsory, but it is worth consideration.

Read why you should consider protecting your IP against infringement and doing so can add financial value to your company.

Read the full article here

Business Cloud

January 2023

Do you have gaping holes in your security?

Our MD Colin Tankard outlines blind spots from APIs to cloud storage and multi-factor authentication in this latest article in Business Cloud.

In the age of cloud technology, many companies mistakenly believe that their data and intellectual property is secure.

Read the full article here 

Professional Security Magazine Online

January 2023

How safe is your Mac?

If you think using an Apple computer protects you from viruses and malware, think again

Here’s why: Read the full article here

Cyber Intelligence

January 2023

Identity & Access Management (IAM) and Privileged Access Management (PAM) are often misunderstood, having similar features in dealing with users, access, and roles. They also refer to safeguarding data by protecting who has access to systems and what manipulation is allowed to sensitive areas.

Despite these facts, they are different. The role of PAM is to protect users with privileged access to sensitive data such as System Administrators or Developers.

Read the full article here in Cyber Intelligence online

2022 Publications

Business Cloud

December 2022

2023 Predictions.

Read our predictions in the recent article in Business Cloud. Including the growth of Application Programming Interfaces (APi’s) – our prediction – It’s imperative to review your full APi code.

Read the full article here

Computer Weekly

November 2022

How gamifying cyber training can improve your defences

Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience.

To see what you need to do to engage your team in essential training read the full article in Computer Weekly here

Cyber Security Intelligence

November 2022

Is it time to consolidate systems?

In the world of HiFi, there has always been the debate around individual components verses a combined system. This conundrum gave birth to the integrated HiFi unit.

The data security world is in the same position, the current reality is, that rather than reducing complexity, too many businesses are managing multiple point products, incompatible dashboards, and struggling to integrate new systems with existing defences.

A new solution, identified by Gartner, is Security Service Edge (SSE). Read all about it in our latest article here

Elite Business Magazine

October 2022

Cyber Essentials Accreditation- is it worth it?

Cyber Essentials Accreditation is a government-backed scheme helping protect against a range of the most common cyber-attacks, but is it worth it?

Find out by reading our latest article in Elite Business Magazine here.

Professional Security Magazine Online

October 2022

APIs, the new threat

Application programming interfaces (APIs) have become the must-have option for many organisations, with enterprise developers relying heavily on them to support the delivery of new products and services. This is no surprise since APIs allow programmers to integrate functionality from externally provided services instead of having to build those functions themselves.

Read the full article here

Professional Security Magazine Online

September 2022

Argument for Multi-Factor Authentication

No longer is it enough to just enter a username and password, as now additional security is required. This is Multi-Factor Authentication; considered the basic line of defence in any environment, a simple solution to lock down accounts, especially those with high levels of control such as Finance, HR and IT.

There are many reasons to use MFA solutions in your network, listed in our latest article here are the key ones.

Daily Record August 2022

Smart meter data could be used for burglaries, claims some cyber security experts.

Suppliers of the devices have insisted that smart meters are secure and adhere to strict product safety laws.

Read the full article here

Express August 2022

Smart meter warning: Cyber experts warn devices could leave you vulnerable to burglars

SMART METERS have become common in UK homes but a worrying new report has warned that they could leave you vulnerable to burglars.

Read the full article here

This is Money August 2022

Could switching smart meter readings to every half hour put your home at risk of being BURGLED?

That’s the warning from cyber experts – but suppliers insist devices are safe.

Changes in the way energy companies take data from the meters mean hackers could use the information to plan burglaries when it indicates the occupants are away.

Read the full article here

Network Security Magazine July 2022

The Case for Threat Modelling

Cyberthreat modelling is the process of developing and applying a representation of adversarial threats, both within a network or in cyberspace. Such threats can target or affect a device, an application, a system, a network, a mission or business function, an organisation, a region or an entire critical infrastructure sector.

To read the full article, please click here

Infosecurity Magazine July 2022

Is There A Weak Link In Your Supply Chain?

Supply chain security is every company’s responsibility. The supply chain is only truly secure when all entities carry out effective, coordinated security measures, ensuring the integrity of supply chain data, the safety of goods and the global economy’s security.

Read our latest article in Infosecurity Magazine Online for some tips and helpful advice on what to do here.

Professional Security Magazine Online June 2022

Start Encrypting Today

The one security tool every organisation should use: Encryption.

Read the full article here

Cyber Security Intelligence May 2022

Never Trust Anything Again – The Zero Trust World

It seems everyone is talking about Zero Trust in our data networks, but it is often a goal which cannot be reached, as it depends so much on business needs and user interactions. However, where possible, a Zero Trust strategy can help a business be more secure and avoid costly hacks.

Zero Trust provides higher security, from the endpoint through to the application than traditional approaches.

Read the full article here

Opportunity Harlow May 2022

Getting your cyber security sorted to work with big businesses

Attendees at this week’s Opportunity Harlow event were given a fascinating, and somewhat startling, insight into data protection and cyber-attacks, including the methods used, and weaknesses exploited by hackers.

Our very own Managing Director; Colin Tankard along with David Carter and Philip Long from Raytheon UK covered how cyber-attacks are the single largest risk to businesses.

To find out more visit Opportunity Harlow Here.

SC Magazine April 2022

In wartime, are critical infrastructure firms upping their game?

While the Ukraine war didn’t spark the all-out cyber battle that experts feared, the conflict has raised concerns about the vulnerability of global critical national infrastructure…

Steve Mansfield-Devine asks if organisations will now address their security holes – or are they just too resistant to change?

In spite of initiatives such as the EU’s Network and Information Security (NIS) Directive, critical infrastructure remains vulnerable. A new report from Dragos reveals that many firms in this sector have weak authentication policies and lack visibility into their network assets, among other challenges.

“NIS is intended to establish a common level of security for network and information systems, as well as physical security systems,” explains Colin Tankard, MD of Digital Pathways. “This is the first stumbling block as many CNI systems are closed, in-house systems, which should have had security built-in at design but were, as often happens, it was an afterthought.

Read the full article here in SC Magazine

Prime Resi April 2022

Is your agency open to large fines under GDPR?

Many firms are still not adhering to the rules around data protection, which could result in costly penalties in the event of a complaint, writes cyber security specialist Colin Tankard.

Increasingly, more people are using the option of a Subject Access Requests (SAR) with the General Data Protection Regulations (GDPR), as a way of checking what information an estate agent holds on them, as well as a way of venting their anger on any poor service.

A SAR needs to be responded to within 30 days and should contain all Personally Identifiable Information (PII) held on the requestor. This can be difficult to comply with, as data is frequently scattered in emails, cloud storage, and other forms of Shadow IT, as well as within client systems such as Alto or Reapit.

So what should you do? Read the full article here in Prime Resi

Infosecurity Magazine April 2022

COVID-19, The Silent Hacker

COVID-19 continues to have the ability to disrupt business. Employees have been awoken to the advantage of flexible working; they have been introduced to the concept of TWaT’s (working Tuesday, Wednesday and Thursday) and will demand the option to work from home or will look to join organizations that offer such flexibility. So, now is the time to put in place a system that can empower flexibility in working without driving support teams into the ground and keeping the corporate data safe and secure, not scattered to every nook and cranny of the internet.

Now that things have settled down and companies are thinking about their long-term options for flexible working wrestling back control of the corporate data assets must be a priority, with data security and integrity being the guiding factors.

Three starting points to consider are listed in the full article here

TechBlast April 2022

How to protect your intellectual property as a startup.

Protecting your intellectual property is not compulsory, but it is worth consideration. Just as having a burglar alarm on your home is not required by law, it is a choice many homeowners make for peace of mind.

Read the full article here for tips that may help you effectively manage your valuable intellectual assets.

Computer Weekly April 2022

Recruitment risks: Avoiding the dangers of fraudulent candidates

Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent?

Read the full article here

Business Cloud March 2022

Businesses urged to beware Russian hacking threat.

Cybersecurity expert says Russia and its allies may retaliate over sanctions imposed due to its invasion of Ukraine

Businesses and individuals alike should be especially vigilant for scams and hacks by Russian vectors as Vladimir Putin’s invasion of Ukraine continues.

Read the full article here

Mail on Sunday March 2022

As experts warn Russian cyber army could target British homes there’s a simple way to foil them…just press DELETE!

A war being waged more than a thousand miles away may not seem so remote if it triggers a cyber attack inside your home. Toby Walne looks at how you can protect your household if Vladimir Putin deploys an army of hackers to wage cyber warfare.

Read the full article here featuring our Managing Director Colin Tankard.

Cyber Security Intelligence February 2022

The Frailty of Email.

Email is a common carrier of bad content but is also a key component in doing business.

Even our most sophisticated detection systems can be fooled by a crafted email from a skilled bad actor. So, the question becomes, is now the time to stop using it and go to closed communication platforms?  No, there is still hope!

Read the full article here

InfoSecurity Magazine February 2022

How to stay on top of Cyber-hygiene

Many organisations have significantly changed how their staff and third-party contractors work and interact with their infrastructure. Now is an excellent time to look at an organisations security posture.

Here are our 5 top tips from Colin Tankard.

Please click here to view Page 37

Professional Security Magazine February 2022

Patching Up

Patching is a basic technique and is often presented as one of the easiest security measures. But it does have its challenges which is the reason so many hackers look to exploit a poorly patched environment. Staying on top of the process, by using a patch management tool, takes away the basic task of housekeeping.

Read the full article here

Critical Comms Magazine November 2021

Cybersecurity: new ways, new vigilance

Following TCCA’s recent cyber security co-ordination meeting, Simon Creasey talks to a variety of industry experts including our Colin Tankard on the challenges presented by the ongoing transition from narrowband to broadband.

Read the full article here

Professional Security Magazine December 2021

Against Hackers with AI

The spiraling growth in hacking is costing businesses’ big time’!

A recent report for the ninth Annual Cost of Cybercrime Study, found the value of risk for an average Times 1000 company, with 2019 revenues of £15 billion, equals 2.8 per cent of revenues per year and, even at this level, weaknesses remain. The cost of being hacked can run into many hundreds of thousands of pounds, coupled with the loss of business, market share and reputational damage.

Read the full article here.

Cyber Security Intelligence November 2021

How good is your resilience testing?

A common test of a network’s resilience is Penetration Testing, or a PEN Test, which is a process that involves discovering security gaps and vulnerabilities within networks and applications. It is often called ethical hacking, as your network is essentially getting hacked but without causing the damage a normal cyber-attack would inflict.

In theory, a PEN test sounds great, which is why so many businesses jump to the conclusion that they need one.

But are there alternatives? Read the full article here 

Network Security Magazine October 2021

Wifi 6. Has it Delivered?

Wifi 6 was released in late 2019 and was promoted as being the saviour for our wireless needs. It claimed to provide faster data transfer, better performance in congested areas, and more security.

But is its security really better?

Read our article on Page 20 here

Info Security Magazine October 2021

Schools Prove Easy target for Hackers

The cost of recovering from a data breach, or ransomware attack, can run into hundreds of thousands of pounds, far outweighing the cost of deploying data protection measures.

But where do you start? Read our latest article here to find out.

Cyber Security Intelligence October 2021

Data is your most valuable asset. How are you protecting yours?

Ransomware is increasing exponentially, year on year, as hackers realise that they can use your most significant asset against you.

Having the ability to back up your data is a necessity, not just due to nefarious actors potentially locking you out of your systems by deploying Ransomware, but also to protect you if your data is lost or corrupted due to human error, system failure or natural disaster.

So, what is Backup and is it enough? Find out in our latest article here

Tes Magazine September 2021

Cyber attacks on schools: The Facts

Hacked Off!

The education sector is increasingly being targeted by cybercriminals, who use ransomware to prevent schools from retrieving their own data and then demand cash to restore access. With such attacks resulting in months of disruption and distress, what can be done to minimise the risks? Simon Creasey reports

Read the full article here

Cyber Security Intelligence July 2021

Security Orchestration Can Help Businesses SOAR

Threats to organisations are coming thick and fast and often businesses do not have adequate or up-to-date solutions to mitigate them. Then, couple it with data being shared in multiple silos, often unprotected, as employees try to find easy ways to work with data.

Companies often have a ‘knee jerk’ reaction to controlling their networks, finding themselves with layered security systems, multiple data packages, all trying to synchronise with each other, with little holistic forethought.

Read the full article here

Network Security Magazine June 2021

Quantifying Cyber Risk

In a recent Enterprise Strategy Group (ESG) survey, the market researchers found that 82% of organisations believe that cyber risk has increased over the last 2 years. Hardly surprising really…

So, how do you establish and understand your business risk?

Read our article on page 20  here

Professional Security Magazine June 2021

Cyber risk, business risk and cost

Cyber risk is business risk.

There are constant published reports showing that all forms of organisations are being exposed to cyber risk and given that much of it is handled online, cyber risk has become an inevitable part of doing business. In fact, a recent Enterprise Strategy Group (ESGstudy found that 82 percent of organisations believe it has increased over the past two years.

Read the full article here

Professional Security Magazine May 2021

Online Safety Bill

The draft Online Safety Bill may be a step too far – would more punitive measures against board room members be a better solution?

“We already have considerable cybersecurity regulation with GDPR, Cyber Essentials, now heavily promoted by government and, the ICO’s aggressive stance over data breaches. I wonder how effective another layer of regulation will really be.

Read the full article here

Global Security Magazine May 2021

Been Hacked by Ransomware – Don’t pay!

Another cyber attack, this time the Colonial Pipeline in the US, targeted with a ransomware attack and forcing the company to close down the system.

Ransomware is a problem for every business, large or small. It usually encrypts all of the data that, without the key, cannot be unlocked. The hacker asks for a ransom to be paid before returning the key, allowing the unlocking of the data.

Read the full article here

Professional Security Magazine March 2021

Gone Phishing, Again!

The biggest security loophole in any system is its human operator and cybercriminals are well aware of this.

Attacks have been changing from mass random email spam messages to highly personalised attacks, such as CEO fraud, where an email appears to come from/to the CEO, and spear phishing.

But how are the attackers using sophisticated tactics, bypassing the SEG and tricking users into taking the bait and transferring the requested money?

Read the full article here

Network Security Magazine February 2021

Credential Stuffing – The New Hack

We hear all of the time about large amounts of data being compromised, but exactly what happens to it and how are hackers profiting from it?

One scheme used by hackers is called credential stuffing. This is where stolen account details, usually user ID’s with corresponding passwords, are used to get into various systems and websites through large-scale automated login requests.

Check out page 20 to read the full article

Global Security Magazine January 2021

Cyber Security Jargon Explained

We all need to be cybersecurity savvy these days, but how many of us understand the jargon often associated with it?

Read the full article here

Info Security Magazine January 2021

3-2-1, No Thank You

From time to time we all receive advice on best practice, and one which has been popular recently is from The National Cyber Security Centre (NCSC), which recommends keeping multiple backups and to logically separate them; three copies of your data, stored on two different media, with one off-site.

Read the full article here

Professional Security Magazine October 2020

File-Less Attacks

There has been a growth in zero-day attacks where the signature of the malware is not known to traditional AV so has an open period to spread its load, until AV vendors add the new threat to their systems. To counter this, many AV vendors are trying to step up their game, adding intelligence to their systems which try to detect strange actions, report back to base and so speed up the detection and blocking of new attacks. Hence, the term Advance Anti-Virus.

Read the full article here

Network Security Magazine October 2020

Remote Working Rest Now Required

It has been impressive to see how businesses and their IT teams have been able to swiftly switch staff to remote working during the lockdown.

However, has this sudden move to remote working raised issues with control of data?

Read our column on Page 20 here

Professional Security Magazine August 2020

How to control the flow of data

The rapid move to home working due to COVID-19 has stretched many IT teams to breaking point. The sheer pressure to help set up home networks, support personal devices and divert telephone systems, has been a massive task.

In a recent survey by Netwrix, 40 percent of organisations are uncertain as to the whereabouts of their vital information and the number of exposed sensitive consumer records is increasing by 126 percent year-on-year.

Read the full article in Professional Security Magazine here

Professional Security Magazine August 2020

What’s Behind You? 

Due to the Covid-19 pandemic, online meeting has boomed, with organisations rushing to get their staff organised, to be able to communicate with clients and each other.

Read the full article in Professional Security Magazine here

Global Security Magazine July 2020

10 Things for Zoom

Over the last months, the online meeting has boomed, with organisations rushing to get their staff organised in order to be able to communicate with clients and each other.

We all seem to have embraced the virtual world. TV channels produced endless interviews featuring ’professionals’ at home including cabinet ministers, pop stars, virtual choirs of 400 plus people, children’s birthday parties with entertainers, even Royalty had a go, all in little boxes on a screen!

Read the full article in Global Security Magazine here

Info Security Magazine June 2020

Sim Swap – the Silent Hacker

Mobile phone operators’ infrastructures are coming under attack due to the ‘fake news’ that the new 5G networks, using Chinese technology, are the cause of the COVID-19 outbreak. As a result, over 126 masts have been burnt in recent weeks.

At a time of national crisis, the last thing needed is a large hole in our mobile network, as we rely so much on mobile phones, both for personal and business use.

Read the full article in Info Security Magazine here

Network Security Magazine May 2020

Pandemic underpins need for SOAR

With the rapid change in working practices due to Covid-19, staff working from home has meant security measures usually in place in the office environment might not be in place, maybe due to the lack of licences or the use of personal devices. Could this mean loss of data for your business?

Read our column on page 20 here

Global Security Magazine May 2020

Will Governments Track & Trace App Keep Data Secure?

The government’s rollout of its Track & Trace App, currently on the Isle of Wight but soon to be across England, is a welcome tool in the fight against the Coronavirus. But, can it be trusted to keep data secure?

Read the full article in Global Security Magazine here

This is Money April 2020

How to beat the fraudsters

The coronavirus lockdown is providing rich pickings for heartless criminals: Here’s how to beat the fraudsters coming after your hard-earned cash

Read the full article in This is Money here

Professional Security Magazine April 2020

Coronavirus:Working From Home

The Covid-19 outbreak has given rise to an increase in the number of state-sponsored cyber attacks, as companies have more employees work from home.

Read the full article in Professional Security Magazine Online here

Global Security Magazine April 2020

Ten Things To Know About The Future Of Speech Recognition

Automatic speech recognition (ASR), the ability to speak directly to a device instead of using a keypad, has come a long way but has much more to offer going forward.

Read the full article in Global Security Magazine here

The Guardian March 2020

Trolls exploit Zoom privacy settings as app gains popularity

Zoombombers’ broadcast explicit imagery or abuse other users in video hangouts

Working and socialising from home has brought new risks to everyday life, as webcam meetings and chatroom cocktail hours contend with privacy invasions, phishing attacks and “zoombombings” – uninvited guests abusing the popular video service to broadcast shocking imagery to all.

Read the full article in The Guardian here

Computer Weekly March 2020

AWS Bucket List: Keep Your Cloud Secure

Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter.

Read the full article in Computer Weekly here

Global Security Magazine March 2020

Working From Home

We are living in a new world order right now with many of us finding ourselves working from home, without the protection and constraints of our usual places of work.

This makes working safely even more important. Here are ten things you can do to ensure you keep yourself, your employer and your data, safe.

Read the Ten Things for working from home safely here in Global Security Magazine

Global Security Magazine March 2020

Encryption, things you should know

Encryption is the process by which information is converted from a readable format into one that obscures it’s meaning from those without the authorisation or ability to decipher it and has long been used to protect sensitive information from prying eyes.

Read the full article in Global Security Magazine

Global Security Magazine February 2020

Ransomware Attacks: What cost?

Ransomware is a form of malware that denies access to a victims system and data, only releasing it once a ransom of some kind is paid. Some such attacks can be reversed quite easily whilst other, more advanced threats make use of cryptoviral extortion, which make files inaccessible until a ransom has been paid, in order to decrypt them.

Read the full article in Global Security Magazine

Network Security Magazine February 2020

The Power of Voice

Complex passwords, password managers, two-factor authentication and biometrics, different technologies and ways to secure access to our devices and information. These are not always easy to use or easy to transfer and some have a degree of inaccuracy. So what about voice recognition?

Read our latest article here on page 20 on the advances in ASR (Advanced Voice Recognition)

Info Security Magazine January 2020

Providing Cyber Defence Without Breaking The Bank

With cyber-attacks costing businesses some £4billion per annum, a figure that keeps on growing, cyber defense systems are a must for all businesses. However, today those defense systems are not confined to the perimeter of the networks, they now go deep inside of the organisation, looking at user behaviour, checking where data is going and even what an employee is doing when they are away from the network.

Read the full article here 

2018/19 Publications

Computer Weekly November 2019

Taking responsibility for security in the cloud

As the data owner you have the ultimate responsibility. Do your due diligence.

Read the full article here

Computer Weekly October 2019

Data Management Strategies are evolving – so must enterprises

A growing number of data-driven initiatives, alongside heightened demand for security in governance, data management and compliance, has led to the rise of a more holistic approach – integrated risk management.

Read the full article here

Network Security Magazine October 2019

Goodbye SIEM, Hello SOARX

Security Information and Event Management (SIEM) technologies have, to date, been leading the war against cybercrime. Welcome SOARX, a solution that offers a central cybersecurity management platform that allows you to monitor, manage, respond, and orchestrate your entire network and security infrastructure via a single pane of glass.

Read the full article here on page 20

Comms Business August 2019

Digital Pathways links up with iCyber Security

Digital Pathways, has linked up with cyber defence system provider, iCyber-Security in order to promote the iCyber-Sheild defence platform.

Read the full article here 

Computer Weekly August 2019

Mitigating social engineering attacks with MFA

The growing frequency of social engineering attacks highlights the increasing need for organisations to take steps to mitigate the effects of phishing

Read the full article here

Mail on Sunday July 2019

Use free wi-fi at your peril.

How the man sat behind you could be emptying your bank account!

Read the article here

Article also published in Express Digest and Newstral

Network Security Magazine July 2019

Why you need Cyber Essentials

The UK Government’s Cyber Essentials programme was developed to help businesses mitigate common online threats.

Read the article here on page 20

Ignites Europe June 2019

WhatsApp Hack: firms urged to pay attention to security risks

How many people think that their data is not of value?

Read the article here

Computer Weekly May 2019

Data governance: The importance of getting it right

Controlling data is a challenge today, with storage being so easy and cheap to implement. But how much is duplicated and how do you know who has access to it and if they should! This article talks about the issues and solutions.

Read the full article in Computer Weekly

Professional Security Magazine Online, May 2019:

GDPR: still much to do???

The article looks at the state of GDPR after one year in force.

Read the full article in Professional Security Magazine Online

Global Security Magazine May 2019

WhatsApp hack and Stuxnet worm very similar

Is the WhatsApp hack similar to the Stuxnet worm seen during the Iran war?

Read the article in Global Security Magazine

Professional Security Magazine online, April 2019

Why Cyber Essentials is essential

This article looks at the benefits of certifications for Cyber security and why all size organisations should look to be certified.

To read this article & more from Professional Security Magazine

Info Security Magazine April 2019:

Can your data be held hostage?

Are the old days of the protection racket now coming to the digital data world, and organisations being threatened if they don’t continue to pay up?

Read the full article in Info Security Magazine

Network Security Magazine, March 2019:

IoT regulations: fact or fiction?

With so many devices on the internet and many without any security considerations, is now the time to force manufacturers to add strong security by imposing regulations?

Read the full article in Network Security Magazine, page 20

Computer Weekly Magazine March 2019:

Using simulated disaster management to tackle the security skills gap

Data security skills are in short supply, at a time when hackers are most active. Is it now time to have cyber technology take over the heavy lifting freeing the data security experts to do their jobs better?

Read the full article in Computer Weekly

Smart Cities World January 2019:

Connectivity in the smart city

Should data security be at the heart of our smart cities and be measured so any new client can rate a building for data protection?

Read the full article in Smart Cities World

Global Security Magazine December 2018:

Marriott hit by hack but where was their log management?

Another hack but how long has it taken to detect and warn its customers, too long as this article points out.

Read the full article in Global Security Magazine

Computer Weekly December 2018:

The Future of Network-Connected Device Security

With so many new devices hitting the market which connect to the internet, experience is showing that most are not secure and leave the user exposed to a wide range of cyber attacks.

Read the full Computer Weekly report

The Mail on Sunday and Mail Online November 2018:

Can you trust one free app to keep all your passwords safe?

Everyone faces the issue of remembering passwords, whether that be for business or personal use. This article looks at the benefits and pitfalls of password managers.

Read the full article in The Mail Online

Essex Live November 2018:

The chilling email threatening to share embarrassing information that is ‘driving people to suicide’

Spam email is effecting everyone but some emails are so realistic that people surcome to the damnds contained within the email

Read the full article in Essex Live

Article Published in The Mail Online

Also published in The Mail on Sunday

Network Security Magazine October 2018:

How trustworthy is AI?

What data security controls (if any) are being put into AI at development stages to protect us

Read the full article on page 20 of Network Security Magazine.

The Mail On Sunday and Mail Online October 2018:

‘Pay the ransom – or watch me wreck your life’

How far will hackers go to get their targets to pay up, are protection rackets coming back but now in the digital world.

Read the full report at The Mail Online

The Mirror October 2018:

Chilling ransom attacks threatening to share embarrassing information ‘driving people to suicide’

Spam emails that have your personal information included, are often so real people believe them.

Read the full article in The Mirror

Computer Weekly Magazine October 2018:

Quantum Computers are coming

The new era of computers is nearly with us and so how will data security keep pace and still secure our data?

Read the report in Computer Weekly

Global Security Magazine September 2018:

Recent Hacks Highlight Need For Intelligence Threat Detection

Traditional Anti Virus is just not good enough in todays world of Fileless attacks.

Read the full article in Global Security Magazine

Mail on Sunday, and Mail Online September 2018:

Hackers steal details of 380,000 BA Customers

Large data breach at BA, but whay was the data not better protected and what can the victims do to protect their identies moving forward.

The full report can be read at Mail Online

Smart Cities World September 2018:

What impact will GDPR have on smart buildings and the data they hold?

Smart Cities and GDPR: What’s next?

Read the full article in Smart Cities World

Network Security Magazine August 2018:

Knowing What you Have: The Road to Effective Data Discovery

GDPR has highlighted the problem of how much data we store and in turn how we can find sensitive data when required for example during a Subject Access Request.

Read the full article on page 15 in Network Security

Info Security Magazine July 2018:

Education & Training: The Downfall of File-less Attacks (AVT)

Advance Threat Detection and user education is the only way to stop the new forms of data attacks.

Read the full article in Info Security Magazine.

Global Security Magazine July 2018:

GDPR Breach: Ready, Get-Set, Go!

Data breaches are still happening even with GDPR! Is nobody encrypting their data?

Read the full article in Global Security Magazine.

Smart Cities World July 2018:

Implementing responsible AI from the start

Will artificial inteligence in smart buildings be the weak link if data security has not built in at the design stage.

Read the full article in Smart Cities World

 Global Security Magazine 

Tesla Feel The Heat Of An Insider Threat

Many companies fail to consider the insider threat with dangerous consequences.

Read the full article here in Global Security Magazine. 

Intercontinental Finance & Law May 2018

Defend at all costs!

The legal sector is one of the most targeted business sectors by hackers. Is it because their defences are so weak?

Read the full article in Intercontinental Finance & Law

Business and Industry Today May 2018

Cyber Security Company of the Year – Digital Pathways: Securing your data

Digital Pathways are recognised by Business and Industry Today for their work in cyber security.

Read the full article on page 32 here

Computer Weekly April 218

Network security in the age of the internet of things

With the rapid growth of IoT devices attaching to our networks do we now know where and how our data is leaving the environment?

Read the full article in Computer Weekly 

Smart Cities World April 2018

Sharing a Data Protection Officer

With GDPR imminent, will organisations be able to afford their own Data Protection Officer or are we about to see the Virtual DPO?

Read the full article in Smart Cities World

Network Security Magazine April 2018

The Threat of Fileless Trojans

The growth in the use of fileless or zero-footprint attacks is alarming. And while they seem to have been targeted at corporate networks so far, they will spread wider.

To read the full article in Network Security Magazine on page 20

Public Sector News April 2018

UK Councils Must Get Their Cyber Security ‘Act Together’

Data owners or managers of departments do not consider who has access to their data and they leave decisions to the IT Department expecting them to know who can access the data and what they can do with it.

Read the article in Public Sector News

Network Security Magazine January 2018

Tackling Push Payment Scams

The Payment Systems Regulator (PSR) has announced an industry-wide action plan to tackle push payment scams

Read the article on page 20 of Network Security Magazine

Infosecurity Magazine January 2018

Cybersecurity Predictions for 2018

What do we think 2018 will bring in thedata security market place?

Read the article in Infosecurity Magazine

Computing Security Magazine january 2018

GDPR: The Silver Lining

Read the full article in Computing Security Magazine

Estate Agent Today January 2018

GDPR: New warning about data security, including job applications

Estate agents and all other businesses to ensure they are prepared for the General Data Protection Regulation, coming into effect on May 25 this year.

Read the full article in Estate Agent Today

Securing Email is Essential

Why mail by electronic must never let down its guard. Ensuring emails are secure is a concern to anyone dealing with confidential information – which of course, includes both the law and finance sectors. However, today, more than ever, it is important, rather critical, to be aware of the dangers of using the usual email […]

cw logo

How to improve security against email attacks and for GDPR compliance

About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies It is not unusual for emails to be used for arranging payments or for submitting identifying documents. “Legal services seem to do 40% of their work on […]

PKWARE partners with Digital Pathways to further UK expansion

LONDON, July 18, 2017 /PRNewswire/ — PKWARE, a global leader in data security, and UK-based Digital Pathways, have announced a new value added partnership. Digital Pathways, established in 1997, specialises in data protection and cyber security. The company works with some of the world’s leading companies to ensure the safety of their data and their compliance […]

Information Security and the Legal Sector

Safeguarding their interests against cyber-attacks should be a top priority for law firms. Financial loss is rarely the most detrimental issue for businesses where cyber attacks are concerned. The legal sector is an especially attractive target for cybercriminals due to the wealth of sensitive information held by law firms. A successful cyber-attack has the potential […]

Are you ready for the General Data Protection Regulations?

Data holding is no longer something an organisation can take lightly, it needs serious thought and processes put in place. The General Data Protection Regulation is the process by which the European Parliament intends to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside […]

Do you know if your emails are secure?

Of all the millions of emails sent each day, how many senders even think about whether their messages are secure? Traditional email has the confidentiality level of a postcard – anyone involved in its transport can easily read it. Lack of care becomes even more of a problem when the sender is attaching confidential or […]

Cybersecurity: What are Insurers Looking For?

Nicola Laver investigates how low firms can satisfy their insurers that their cybersecurity and anti-commercial crime strategies are robust. Given that research has shown that cyberattacks on UK  law firms increased by nearly 20% between 2014-2015 and 2015-2016, robust cybersecurity strategies are vital issues; furthermore, 73% of the top 100 law firms in the UK […]

CYBER SECURITY PRIORITIES FOR 2017

Cyber security is generally agreed upon as a protection of electronic information, the ICTs that support cyberspace. It is also protection in a number of spaces including personal, professional, and even national. Sometimes, all three of these can interconnect into a cyber nightmare because one element was vulnerable to being attacked, which in turn had […]