Knowing What you Have: The Road to Effective Data Discovery

It’s hard to keep data secure when you’re not sure what information you have. While your databases might be neatly ordered and well understood, much of the information washing around in organisations is likely to be in the form unstructured data – emails.PDFs, word processor and spreadsheet files and many other types in a wide […]

Education & Training: The Downfall of File-less Attacks (AVT)

Whilst we are all aware of the file-less or zero-footprint attack, the growth in their use has been alarming. With regular anti-virus tools less likely to detect them, how can the ‘savvy’ CIO ward against them? The answer lies squarely in the need for the education and training of employees, ensuring they fully understand exactly […]

GDPR Breach: Ready, Get-Set, Go!

So here we go, GPPR has been in force for just under two months and already two well known brands have been caught in its net. Luxury retailer, Fortnum & Mason, have detailed the loss of some 23,000 customer records, which include emails, telephone numbers and delivery addresses of customers who filled out a survey, […]

Implementing responsible AI from the start

Digital Pathways’ Colin Tankard looks at how we reap the rewards of AI while avoiding the risks. Artificial intelligence (AI) and machine learning (ML) are two very hot buzzwords right now and often seem to be used interchangeably. They are not quite the same thing, but the perception that they are can sometimes lead to […]

Tesla Feel The Heat Of An Insider Threat

Tesla, the luxury electric car maker, seem to have fallen foul of an insider threat episode, with Elon Musk, warning that a disgruntled staff member had altered the company’s IT system code, harvesting highly sensitive information and giving it to others. Traditionally, the term ‘Insider Threat’ does indeed invoke images of malicious employees lurking in the […]

Streamlining data discovery

Understanding what unstructured data exists in the enterprise is not easy. Massive volumes of documents, spreadsheets, presentations and emails are typically scattered about an organisation. With no real tools to manage it based on business value, it accumulates with no end in sight. The easy option is to buy more storage but that doesn’t fix […]

Defend at all costs!

Legal sector must ‘step up a gear’ in Cyber technology. Hackers view the legal sector, which tends to store and process critical and invaluable information, as a potential weak point in the cyber security chain and are constantly pursuing different ways to access legal organisations, both large and small. It is high time that the […]

How to keep a hacker out of your computer: The security of your data is vital – use our guide to stay safe

In the wake of the meltdown at TSB and the harvesting of personal information from Facebook, people are increasingly nervous about managing their finances online. Here, The Mail on Sunday looks at how safe our data is and what we can do to protect ourselves from scams and fraudsters. ACT ON NEW DATA PROTECTION LAW […]