Press Room
Press articles relating to everything cybersecurity, data protection, GDPR & compliance, latest breaches & new security solution updates, all offering an insight into the cybersecurity industry
Press Room Articles
2023 Publications
Elite Business
October 2023
Is your email security fit for purpose?
Business Cloud
October 2023
Email – the open door to your network for hackers
Email security is a substantial and complex problem that requires ongoing efforts to mitigate risks and protect individuals and organisations.
Email security is a significant and ongoing concern due to the widespread use of email for communication, both in personal and professional settings.
According to Proofpoint, a leading global security provider and the third-largest email scanning platform in the world, approximately 3.1 billion domain-spoofing emails are sent daily, and more than 90% of major cyberattacks are initiated by a single email.
The monetary impact that compromised emails have caused to the global economy is estimated to be $31 billion since 2016.
Read our full article here
Elite Business
August 2023
Is non-compliance the biggest threat to an SME?
SMEs face all the same regulations and challenges as large multinationals and PLCs but often do not proportion their investments back into the business as other larger organisations. This is most evident when we review SMEs’ budgets assigned to compliance and data security.
Read the full article here
Cyber Security Intelligence
May 2023
Julius Caesar Used Encryption. Shouldn’t You?
Encryption is the process by which information is converted from a readable format into one that obscures its meaning from those without the authorisation or ability to decipher it and has long been used to protect sensitive information from prying eyes.
Encryption is invaluable for ensuring that sensitive information that falls into the wrong hands, is prevented from being of use to anyone without the ability to decrypt that information.
Find out why here
Professional Security Magazine
May 2023
What is enhanced encryption?
Encryption is essential for protecting information that is in storage, such as on a device, in a data-base or in a cloud service, as well as when it is being transmitted—generally referred to as data at rest and data in motion. It ensures that data is safeguarded against loss or unauthorised access.
Access controls should then be applied to all data according to its defined sensitivity……..
Read the full article here
Business Cloud
April 2023
Cyber Essentials Accreditation – Is it worth it?
Obtaining the certification is absolutely worth the time and effort – and should be a standard cyber security requirement for all businesses.
Read why in our full article here
Elite Business
April 2023
How to protect your intellectual property
Protecting your intellectual property (IP) is not compulsory, but it is worth consideration.
Read why you should consider protecting your IP against infringement and doing so can add financial value to your company.
Read the full article here
Business Cloud
January 2023
Do you have gaping holes in your security?
Our MD Colin Tankard outlines blind spots from APIs to cloud storage and multi-factor authentication in this latest article in Business Cloud.
In the age of cloud technology, many companies mistakenly believe that their data and intellectual property is secure.
Read the full article here
Professional Security Magazine Online
January 2023
How safe is your Mac?
If you think using an Apple computer protects you from viruses and malware, think again
Here’s why: Read the full article here
Cyber Intelligence
January 2023
Identity & Access Management (IAM) and Privileged Access Management (PAM) are often misunderstood, having similar features in dealing with users, access, and roles. They also refer to safeguarding data by protecting who has access to systems and what manipulation is allowed to sensitive areas.
Despite these facts, they are different. The role of PAM is to protect users with privileged access to sensitive data such as System Administrators or Developers.
Read the full article here in Cyber Intelligence online
2022 Publications
Business Cloud
December 2022
2023 Predictions.
Read our predictions in the recent article in Business Cloud. Including the growth of Application Programming Interfaces (APi’s) – our prediction – It’s imperative to review your full APi code.
Read the full article here
Computer Weekly
November 2022
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience.
To see what you need to do to engage your team in essential training read the full article in Computer Weekly here
Cyber Security Intelligence
November 2022
Is it time to consolidate systems?
In the world of HiFi, there has always been the debate around individual components verses a combined system. This conundrum gave birth to the integrated HiFi unit.
The data security world is in the same position, the current reality is, that rather than reducing complexity, too many businesses are managing multiple point products, incompatible dashboards, and struggling to integrate new systems with existing defences.
A new solution, identified by Gartner, is Security Service Edge (SSE). Read all about it in our latest article here
Elite Business Magazine
October 2022
Cyber Essentials Accreditation- is it worth it?
Cyber Essentials Accreditation is a government-backed scheme helping protect against a range of the most common cyber-attacks, but is it worth it?
Find out by reading our latest article in Elite Business Magazine here.
Professional Security Magazine Online
October 2022
APIs, the new threat
Application programming interfaces (APIs) have become the must-have option for many organisations, with enterprise developers relying heavily on them to support the delivery of new products and services. This is no surprise since APIs allow programmers to integrate functionality from externally provided services instead of having to build those functions themselves.
Read the full article here
Professional Security Magazine Online
September 2022
Argument for Multi-Factor Authentication
No longer is it enough to just enter a username and password, as now additional security is required. This is Multi-Factor Authentication; considered the basic line of defence in any environment, a simple solution to lock down accounts, especially those with high levels of control such as Finance, HR and IT.
There are many reasons to use MFA solutions in your network, listed in our latest article here are the key ones.
Daily Record August 2022
Smart meter data could be used for burglaries, claims some cyber security experts.
Suppliers of the devices have insisted that smart meters are secure and adhere to strict product safety laws.
Read the full article here
Express August 2022
Smart meter warning: Cyber experts warn devices could leave you vulnerable to burglars
SMART METERS have become common in UK homes but a worrying new report has warned that they could leave you vulnerable to burglars.
Read the full article here
This is Money August 2022
Could switching smart meter readings to every half hour put your home at risk of being BURGLED?
That’s the warning from cyber experts – but suppliers insist devices are safe.
Changes in the way energy companies take data from the meters mean hackers could use the information to plan burglaries when it indicates the occupants are away.
Read the full article here
Network Security Magazine July 2022
The Case for Threat Modelling
Cyberthreat modelling is the process of developing and applying a representation of adversarial threats, both within a network or in cyberspace. Such threats can target or affect a device, an application, a system, a network, a mission or business function, an organisation, a region or an entire critical infrastructure sector.
To read the full article, please click here
Infosecurity Magazine July 2022
Is There A Weak Link In Your Supply Chain?
Supply chain security is every company’s responsibility. The supply chain is only truly secure when all entities carry out effective, coordinated security measures, ensuring the integrity of supply chain data, the safety of goods and the global economy’s security.
Read our latest article in Infosecurity Magazine Online for some tips and helpful advice on what to do here.
Professional Security Magazine Online June 2022
Start Encrypting Today
The one security tool every organisation should use: Encryption.
Read the full article here
Cyber Security Intelligence May 2022
Never Trust Anything Again – The Zero Trust World
It seems everyone is talking about Zero Trust in our data networks, but it is often a goal which cannot be reached, as it depends so much on business needs and user interactions. However, where possible, a Zero Trust strategy can help a business be more secure and avoid costly hacks.
Zero Trust provides higher security, from the endpoint through to the application than traditional approaches.
Read the full article here
Opportunity Harlow May 2022
Getting your cyber security sorted to work with big businesses
Attendees at this week’s Opportunity Harlow event were given a fascinating, and somewhat startling, insight into data protection and cyber-attacks, including the methods used, and weaknesses exploited by hackers.
Our very own Managing Director; Colin Tankard along with David Carter and Philip Long from Raytheon UK covered how cyber-attacks are the single largest risk to businesses.
To find out more visit Opportunity Harlow Here.
SC Magazine April 2022
In wartime, are critical infrastructure firms upping their game?
While the Ukraine war didn’t spark the all-out cyber battle that experts feared, the conflict has raised concerns about the vulnerability of global critical national infrastructure…
Steve Mansfield-Devine asks if organisations will now address their security holes – or are they just too resistant to change?
In spite of initiatives such as the EU’s Network and Information Security (NIS) Directive, critical infrastructure remains vulnerable. A new report from Dragos reveals that many firms in this sector have weak authentication policies and lack visibility into their network assets, among other challenges.
“NIS is intended to establish a common level of security for network and information systems, as well as physical security systems,” explains Colin Tankard, MD of Digital Pathways. “This is the first stumbling block as many CNI systems are closed, in-house systems, which should have had security built-in at design but were, as often happens, it was an afterthought.
Read the full article here in SC Magazine
Prime Resi April 2022
Is your agency open to large fines under GDPR?
Many firms are still not adhering to the rules around data protection, which could result in costly penalties in the event of a complaint, writes cyber security specialist Colin Tankard.
Increasingly, more people are using the option of a Subject Access Requests (SAR) with the General Data Protection Regulations (GDPR), as a way of checking what information an estate agent holds on them, as well as a way of venting their anger on any poor service.
A SAR needs to be responded to within 30 days and should contain all Personally Identifiable Information (PII) held on the requestor. This can be difficult to comply with, as data is frequently scattered in emails, cloud storage, and other forms of Shadow IT, as well as within client systems such as Alto or Reapit.
So what should you do? Read the full article here in Prime Resi
Infosecurity Magazine April 2022
COVID-19, The Silent Hacker
COVID-19 continues to have the ability to disrupt business. Employees have been awoken to the advantage of flexible working; they have been introduced to the concept of TWaT’s (working Tuesday, Wednesday and Thursday) and will demand the option to work from home or will look to join organizations that offer such flexibility. So, now is the time to put in place a system that can empower flexibility in working without driving support teams into the ground and keeping the corporate data safe and secure, not scattered to every nook and cranny of the internet.
Now that things have settled down and companies are thinking about their long-term options for flexible working wrestling back control of the corporate data assets must be a priority, with data security and integrity being the guiding factors.
Three starting points to consider are listed in the full article here
TechBlast April 2022
How to protect your intellectual property as a startup.
Protecting your intellectual property is not compulsory, but it is worth consideration. Just as having a burglar alarm on your home is not required by law, it is a choice many homeowners make for peace of mind.
Read the full article here for tips that may help you effectively manage your valuable intellectual assets.
Computer Weekly April 2022
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent?
Read the full article here
Business Cloud March 2022
Businesses urged to beware Russian hacking threat.
Cybersecurity expert says Russia and its allies may retaliate over sanctions imposed due to its invasion of Ukraine
Businesses and individuals alike should be especially vigilant for scams and hacks by Russian vectors as Vladimir Putin’s invasion of Ukraine continues.
Read the full article here
Mail on Sunday March 2022
As experts warn Russian cyber army could target British homes there’s a simple way to foil them…just press DELETE!
A war being waged more than a thousand miles away may not seem so remote if it triggers a cyber attack inside your home. Toby Walne looks at how you can protect your household if Vladimir Putin deploys an army of hackers to wage cyber warfare.
Read the full article here featuring our Managing Director Colin Tankard.
Cyber Security Intelligence February 2022
The Frailty of Email.
Email is a common carrier of bad content but is also a key component in doing business.
Even our most sophisticated detection systems can be fooled by a crafted email from a skilled bad actor. So, the question becomes, is now the time to stop using it and go to closed communication platforms? No, there is still hope!
Read the full article here
InfoSecurity Magazine February 2022
How to stay on top of Cyber-hygiene
Many organisations have significantly changed how their staff and third-party contractors work and interact with their infrastructure. Now is an excellent time to look at an organisations security posture.
Here are our 5 top tips from Colin Tankard.
Please click here to view Page 37
Professional Security Magazine February 2022
Patching Up
Patching is a basic technique and is often presented as one of the easiest security measures. But it does have its challenges which is the reason so many hackers look to exploit a poorly patched environment. Staying on top of the process, by using a patch management tool, takes away the basic task of housekeeping.
Read the full article here
Critical Comms Magazine November 2021
Cybersecurity: new ways, new vigilance
Following TCCA’s recent cyber security co-ordination meeting, Simon Creasey talks to a variety of industry experts including our Colin Tankard on the challenges presented by the ongoing transition from narrowband to broadband.
Read the full article here
Professional Security Magazine December 2021
Against Hackers with AI
The spiraling growth in hacking is costing businesses’ big time’!
A recent report for the ninth Annual Cost of Cybercrime Study, found the value of risk for an average Times 1000 company, with 2019 revenues of £15 billion, equals 2.8 per cent of revenues per year and, even at this level, weaknesses remain. The cost of being hacked can run into many hundreds of thousands of pounds, coupled with the loss of business, market share and reputational damage.
Read the full article here.
Cyber Security Intelligence November 2021
How good is your resilience testing?
A common test of a network’s resilience is Penetration Testing, or a PEN Test, which is a process that involves discovering security gaps and vulnerabilities within networks and applications. It is often called ethical hacking, as your network is essentially getting hacked but without causing the damage a normal cyber-attack would inflict.
In theory, a PEN test sounds great, which is why so many businesses jump to the conclusion that they need one.
But are there alternatives? Read the full article here
Network Security Magazine October 2021
Wifi 6. Has it Delivered?
Wifi 6 was released in late 2019 and was promoted as being the saviour for our wireless needs. It claimed to provide faster data transfer, better performance in congested areas, and more security.
But is its security really better?
Read our article on Page 20 here
Info Security Magazine October 2021
Schools Prove Easy target for Hackers
The cost of recovering from a data breach, or ransomware attack, can run into hundreds of thousands of pounds, far outweighing the cost of deploying data protection measures.
But where do you start? Read our latest article here to find out.
Cyber Security Intelligence October 2021
Data is your most valuable asset. How are you protecting yours?
Ransomware is increasing exponentially, year on year, as hackers realise that they can use your most significant asset against you.
Having the ability to back up your data is a necessity, not just due to nefarious actors potentially locking you out of your systems by deploying Ransomware, but also to protect you if your data is lost or corrupted due to human error, system failure or natural disaster.
So, what is Backup and is it enough? Find out in our latest article here
Tes Magazine September 2021
Cyber attacks on schools: The Facts
Hacked Off!
The education sector is increasingly being targeted by cybercriminals, who use ransomware to prevent schools from retrieving their own data and then demand cash to restore access. With such attacks resulting in months of disruption and distress, what can be done to minimise the risks? Simon Creasey reports
Read the full article here
Cyber Security Intelligence July 2021
Security Orchestration Can Help Businesses SOAR
Threats to organisations are coming thick and fast and often businesses do not have adequate or up-to-date solutions to mitigate them. Then, couple it with data being shared in multiple silos, often unprotected, as employees try to find easy ways to work with data.
Companies often have a ‘knee jerk’ reaction to controlling their networks, finding themselves with layered security systems, multiple data packages, all trying to synchronise with each other, with little holistic forethought.
Read the full article here
Network Security Magazine June 2021
Quantifying Cyber Risk
In a recent Enterprise Strategy Group (ESG) survey, the market researchers found that 82% of organisations believe that cyber risk has increased over the last 2 years. Hardly surprising really…
So, how do you establish and understand your business risk?
Read our article on page 20 here
Professional Security Magazine June 2021
Cyber risk, business risk and cost
Cyber risk is business risk.
There are constant published reports showing that all forms of organisations are being exposed to cyber risk and given that much of it is handled online, cyber risk has become an inevitable part of doing business. In fact, a recent Enterprise Strategy Group (ESG) study found that 82 percent of organisations believe it has increased over the past two years.
Read the full article here
Professional Security Magazine May 2021
Online Safety Bill
The draft Online Safety Bill may be a step too far – would more punitive measures against board room members be a better solution?
“We already have considerable cybersecurity regulation with GDPR, Cyber Essentials, now heavily promoted by government and, the ICO’s aggressive stance over data breaches. I wonder how effective another layer of regulation will really be.
Read the full article here
Global Security Magazine May 2021
Been Hacked by Ransomware – Don’t pay!
Another cyber attack, this time the Colonial Pipeline in the US, targeted with a ransomware attack and forcing the company to close down the system.
Ransomware is a problem for every business, large or small. It usually encrypts all of the data that, without the key, cannot be unlocked. The hacker asks for a ransom to be paid before returning the key, allowing the unlocking of the data.
Read the full article here
Professional Security Magazine March 2021
Gone Phishing, Again!
The biggest security loophole in any system is its human operator and cybercriminals are well aware of this.
Attacks have been changing from mass random email spam messages to highly personalised attacks, such as CEO fraud, where an email appears to come from/to the CEO, and spear phishing.
But how are the attackers using sophisticated tactics, bypassing the SEG and tricking users into taking the bait and transferring the requested money?
Read the full article here
Network Security Magazine February 2021
Credential Stuffing – The New Hack
We hear all of the time about large amounts of data being compromised, but exactly what happens to it and how are hackers profiting from it?
One scheme used by hackers is called credential stuffing. This is where stolen account details, usually user ID’s with corresponding passwords, are used to get into various systems and websites through large-scale automated login requests.
Check out page 20 to read the full article
Global Security Magazine January 2021
Cyber Security Jargon Explained
We all need to be cybersecurity savvy these days, but how many of us understand the jargon often associated with it?
Read the full article here
Info Security Magazine January 2021
3-2-1, No Thank You
From time to time we all receive advice on best practice, and one which has been popular recently is from The National Cyber Security Centre (NCSC), which recommends keeping multiple backups and to logically separate them; three copies of your data, stored on two different media, with one off-site.
Read the full article here
Professional Security Magazine October 2020
File-Less Attacks
There has been a growth in zero-day attacks where the signature of the malware is not known to traditional AV so has an open period to spread its load, until AV vendors add the new threat to their systems. To counter this, many AV vendors are trying to step up their game, adding intelligence to their systems which try to detect strange actions, report back to base and so speed up the detection and blocking of new attacks. Hence, the term Advance Anti-Virus.
Read the full article here
Network Security Magazine October 2020
Remote Working Rest Now Required
It has been impressive to see how businesses and their IT teams have been able to swiftly switch staff to remote working during the lockdown.
However, has this sudden move to remote working raised issues with control of data?
Read our column on Page 20 here
Professional Security Magazine August 2020
How to control the flow of data
The rapid move to home working due to COVID-19 has stretched many IT teams to breaking point. The sheer pressure to help set up home networks, support personal devices and divert telephone systems, has been a massive task.
In a recent survey by Netwrix, 40 percent of organisations are uncertain as to the whereabouts of their vital information and the number of exposed sensitive consumer records is increasing by 126 percent year-on-year.
Read the full article in Professional Security Magazine here
Professional Security Magazine August 2020
What’s Behind You?
Due to the Covid-19 pandemic, online meeting has boomed, with organisations rushing to get their staff organised, to be able to communicate with clients and each other.
Read the full article in Professional Security Magazine here
Global Security Magazine July 2020
10 Things for Zoom
Over the last months, the online meeting has boomed, with organisations rushing to get their staff organised in order to be able to communicate with clients and each other.
We all seem to have embraced the virtual world. TV channels produced endless interviews featuring ’professionals’ at home including cabinet ministers, pop stars, virtual choirs of 400 plus people, children’s birthday parties with entertainers, even Royalty had a go, all in little boxes on a screen!
Read the full article in Global Security Magazine here
Info Security Magazine June 2020
Sim Swap – the Silent Hacker
Mobile phone operators’ infrastructures are coming under attack due to the ‘fake news’ that the new 5G networks, using Chinese technology, are the cause of the COVID-19 outbreak. As a result, over 126 masts have been burnt in recent weeks.
At a time of national crisis, the last thing needed is a large hole in our mobile network, as we rely so much on mobile phones, both for personal and business use.
Read the full article in Info Security Magazine here
Network Security Magazine May 2020
Pandemic underpins need for SOAR
With the rapid change in working practices due to Covid-19, staff working from home has meant security measures usually in place in the office environment might not be in place, maybe due to the lack of licences or the use of personal devices. Could this mean loss of data for your business?
Read our column on page 20 here
Global Security Magazine May 2020
Will Governments Track & Trace App Keep Data Secure?
The government’s rollout of its Track & Trace App, currently on the Isle of Wight but soon to be across England, is a welcome tool in the fight against the Coronavirus. But, can it be trusted to keep data secure?
Read the full article in Global Security Magazine here
This is Money April 2020
How to beat the fraudsters
The coronavirus lockdown is providing rich pickings for heartless criminals: Here’s how to beat the fraudsters coming after your hard-earned cash
Read the full article in This is Money here
Professional Security Magazine April 2020
Coronavirus:Working From Home
The Covid-19 outbreak has given rise to an increase in the number of state-sponsored cyber attacks, as companies have more employees work from home.
Read the full article in Professional Security Magazine Online here
Global Security Magazine April 2020
Ten Things To Know About The Future Of Speech Recognition
Automatic speech recognition (ASR), the ability to speak directly to a device instead of using a keypad, has come a long way but has much more to offer going forward.
Read the full article in Global Security Magazine here
The Guardian March 2020
Trolls exploit Zoom privacy settings as app gains popularity
Zoombombers’ broadcast explicit imagery or abuse other users in video hangouts
Working and socialising from home has brought new risks to everyday life, as webcam meetings and chatroom cocktail hours contend with privacy invasions, phishing attacks and “zoombombings” – uninvited guests abusing the popular video service to broadcast shocking imagery to all.
Read the full article in The Guardian here
Computer Weekly March 2020
AWS Bucket List: Keep Your Cloud Secure
Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter.
Read the full article in Computer Weekly here
Global Security Magazine March 2020
Working From Home
We are living in a new world order right now with many of us finding ourselves working from home, without the protection and constraints of our usual places of work.
This makes working safely even more important. Here are ten things you can do to ensure you keep yourself, your employer and your data, safe.
Read the Ten Things for working from home safely here in Global Security Magazine
Global Security Magazine March 2020
Encryption, things you should know
Encryption is the process by which information is converted from a readable format into one that obscures it’s meaning from those without the authorisation or ability to decipher it and has long been used to protect sensitive information from prying eyes.
Read the full article in Global Security Magazine
Global Security Magazine February 2020
Ransomware Attacks: What cost?
Ransomware is a form of malware that denies access to a victims system and data, only releasing it once a ransom of some kind is paid. Some such attacks can be reversed quite easily whilst other, more advanced threats make use of cryptoviral extortion, which make files inaccessible until a ransom has been paid, in order to decrypt them.
Read the full article in Global Security Magazine
Network Security Magazine February 2020
The Power of Voice
Complex passwords, password managers, two-factor authentication and biometrics, different technologies and ways to secure access to our devices and information. These are not always easy to use or easy to transfer and some have a degree of inaccuracy. So what about voice recognition?
Read our latest article here on page 20 on the advances in ASR (Advanced Voice Recognition)
Info Security Magazine January 2020
Providing Cyber Defence Without Breaking The Bank
With cyber-attacks costing businesses some £4billion per annum, a figure that keeps on growing, cyber defense systems are a must for all businesses. However, today those defense systems are not confined to the perimeter of the networks, they now go deep inside of the organisation, looking at user behaviour, checking where data is going and even what an employee is doing when they are away from the network.
Read the full article here
2018/19 Publications
Computer Weekly November 2019
Taking responsibility for security in the cloud
As the data owner you have the ultimate responsibility. Do your due diligence.
Read the full article here
Computer Weekly October 2019
Data Management Strategies are evolving – so must enterprises
A growing number of data-driven initiatives, alongside heightened demand for security in governance, data management and compliance, has led to the rise of a more holistic approach – integrated risk management.
Read the full article here
Network Security Magazine October 2019
Goodbye SIEM, Hello SOARX
Security Information and Event Management (SIEM) technologies have, to date, been leading the war against cybercrime. Welcome SOARX, a solution that offers a central cybersecurity management platform that allows you to monitor, manage, respond, and orchestrate your entire network and security infrastructure via a single pane of glass.
Read the full article here on page 20
Comms Business August 2019
Digital Pathways links up with iCyber Security
Digital Pathways, has linked up with cyber defence system provider, iCyber-Security in order to promote the iCyber-Sheild defence platform.
Read the full article here
Computer Weekly August 2019
Mitigating social engineering attacks with MFA
The growing frequency of social engineering attacks highlights the increasing need for organisations to take steps to mitigate the effects of phishing
Mail on Sunday July 2019
Use free wi-fi at your peril.
How the man sat behind you could be emptying your bank account!
Article also published in Express Digest and Newstral
Network Security Magazine July 2019
Why you need Cyber Essentials
The UK Government’s Cyber Essentials programme was developed to help businesses mitigate common online threats.
Read the article here on page 20
Ignites Europe June 2019
WhatsApp Hack: firms urged to pay attention to security risks
How many people think that their data is not of value?
Computer Weekly May 2019
Data governance: The importance of getting it right
Controlling data is a challenge today, with storage being so easy and cheap to implement. But how much is duplicated and how do you know who has access to it and if they should! This article talks about the issues and solutions.
Read the full article in Computer Weekly
Professional Security Magazine Online, May 2019:
GDPR: still much to do???
The article looks at the state of GDPR after one year in force.
Read the full article in Professional Security Magazine Online
Global Security Magazine May 2019
WhatsApp hack and Stuxnet worm very similar
Is the WhatsApp hack similar to the Stuxnet worm seen during the Iran war?
Read the article in Global Security Magazine
Professional Security Magazine online, April 2019
Why Cyber Essentials is essential
This article looks at the benefits of certifications for Cyber security and why all size organisations should look to be certified.
To read this article & more from Professional Security Magazine
Info Security Magazine April 2019:
Can your data be held hostage?
Are the old days of the protection racket now coming to the digital data world, and organisations being threatened if they don’t continue to pay up?
Read the full article in Info Security Magazine
Network Security Magazine, March 2019:
IoT regulations: fact or fiction?
With so many devices on the internet and many without any security considerations, is now the time to force manufacturers to add strong security by imposing regulations?
Read the full article in Network Security Magazine, page 20
Computer Weekly Magazine March 2019:
Using simulated disaster management to tackle the security skills gap
Data security skills are in short supply, at a time when hackers are most active. Is it now time to have cyber technology take over the heavy lifting freeing the data security experts to do their jobs better?
Read the full article in Computer Weekly
Smart Cities World January 2019:
Connectivity in the smart city
Should data security be at the heart of our smart cities and be measured so any new client can rate a building for data protection?
Read the full article in Smart Cities World
Global Security Magazine December 2018:
Marriott hit by hack but where was their log management?
Another hack but how long has it taken to detect and warn its customers, too long as this article points out.
Read the full article in Global Security Magazine
Computer Weekly December 2018:
The Future of Network-Connected Device Security
With so many new devices hitting the market which connect to the internet, experience is showing that most are not secure and leave the user exposed to a wide range of cyber attacks.
Read the full Computer Weekly report
The Mail on Sunday and Mail Online November 2018:
Can you trust one free app to keep all your passwords safe?
Everyone faces the issue of remembering passwords, whether that be for business or personal use. This article looks at the benefits and pitfalls of password managers.
Read the full article in The Mail Online
Essex Live November 2018:
The chilling email threatening to share embarrassing information that is ‘driving people to suicide’
Spam email is effecting everyone but some emails are so realistic that people surcome to the damnds contained within the email
Read the full article in Essex Live
Article Published in The Mail Online
Also published in The Mail on Sunday
Network Security Magazine October 2018:
How trustworthy is AI?
What data security controls (if any) are being put into AI at development stages to protect us
Read the full article on page 20 of Network Security Magazine.
The Mail On Sunday and Mail Online October 2018:
‘Pay the ransom – or watch me wreck your life’
How far will hackers go to get their targets to pay up, are protection rackets coming back but now in the digital world.
Read the full report at The Mail Online
The Mirror October 2018:
Chilling ransom attacks threatening to share embarrassing information ‘driving people to suicide’
Spam emails that have your personal information included, are often so real people believe them.
Read the full article in The Mirror
Computer Weekly Magazine October 2018:
Quantum Computers are coming
The new era of computers is nearly with us and so how will data security keep pace and still secure our data?
Read the report in Computer Weekly
Global Security Magazine September 2018:
Recent Hacks Highlight Need For Intelligence Threat Detection
Traditional Anti Virus is just not good enough in todays world of Fileless attacks.
Read the full article in Global Security Magazine
Mail on Sunday, and Mail Online September 2018:
Hackers steal details of 380,000 BA Customers
Large data breach at BA, but whay was the data not better protected and what can the victims do to protect their identies moving forward.
The full report can be read at Mail Online
Smart Cities World September 2018:
What impact will GDPR have on smart buildings and the data they hold?
Smart Cities and GDPR: What’s next?
Read the full article in Smart Cities World
Network Security Magazine August 2018:
Knowing What you Have: The Road to Effective Data Discovery
GDPR has highlighted the problem of how much data we store and in turn how we can find sensitive data when required for example during a Subject Access Request.
Read the full article on page 15 in Network Security
Info Security Magazine July 2018:
Education & Training: The Downfall of File-less Attacks (AVT)
Advance Threat Detection and user education is the only way to stop the new forms of data attacks.
Read the full article in Info Security Magazine.
Global Security Magazine July 2018:
GDPR Breach: Ready, Get-Set, Go!
Data breaches are still happening even with GDPR! Is nobody encrypting their data?
Read the full article in Global Security Magazine.
Smart Cities World July 2018:
Implementing responsible AI from the start
Will artificial inteligence in smart buildings be the weak link if data security has not built in at the design stage.
Read the full article in Smart Cities World
Global Security Magazine
Tesla Feel The Heat Of An Insider Threat
Many companies fail to consider the insider threat with dangerous consequences.
Read the full article here in Global Security Magazine.
Intercontinental Finance & Law May 2018
Defend at all costs!
The legal sector is one of the most targeted business sectors by hackers. Is it because their defences are so weak?
Read the full article in Intercontinental Finance & Law
Business and Industry Today May 2018
Cyber Security Company of the Year – Digital Pathways: Securing your data
Digital Pathways are recognised by Business and Industry Today for their work in cyber security.
Read the full article on page 32 here
Computer Weekly April 218
Network security in the age of the internet of things
With the rapid growth of IoT devices attaching to our networks do we now know where and how our data is leaving the environment?
Read the full article in Computer Weekly
Smart Cities World April 2018
Sharing a Data Protection Officer
With GDPR imminent, will organisations be able to afford their own Data Protection Officer or are we about to see the Virtual DPO?
Read the full article in Smart Cities World
Network Security Magazine April 2018
The Threat of Fileless Trojans
The growth in the use of fileless or zero-footprint attacks is alarming. And while they seem to have been targeted at corporate networks so far, they will spread wider.
To read the full article in Network Security Magazine on page 20
Public Sector News April 2018
UK Councils Must Get Their Cyber Security ‘Act Together’
Data owners or managers of departments do not consider who has access to their data and they leave decisions to the IT Department expecting them to know who can access the data and what they can do with it.
Read the article in Public Sector News
Network Security Magazine January 2018
Tackling Push Payment Scams
The Payment Systems Regulator (PSR) has announced an industry-wide action plan to tackle push payment scams
Read the article on page 20 of Network Security Magazine
Infosecurity Magazine January 2018
Cybersecurity Predictions for 2018
What do we think 2018 will bring in thedata security market place?
Read the article in Infosecurity Magazine
Computing Security Magazine january 2018
GDPR: The Silver Lining
Read the full article in Computing Security Magazine
Estate Agent Today January 2018
GDPR: New warning about data security, including job applications
Estate agents and all other businesses to ensure they are prepared for the General Data Protection Regulation, coming into effect on May 25 this year.
Learning from a cyber attack
New research also reveals that two thirds of UK businesses have no official ransomware policy to guide employees in the event of an attack. Organisations must protect and educate their users, says Tankard There are many reasons organisations do not follow the latest software releases but what seems to constantly fail, is the “thought process” […]
Are You Protecting Your Documents With A Digital Signature?
Protecting digital documents and being able to verify that the sender of a file is, in fact, who they say they are, is fast becoming a major concern for many businesses. Whether receiving a document from a business partner or downloading software from the Internet, the ability to verify the integrity of a file is […]
How log management can protect your systems
Every PC and server you use will keep an audit of its activity, which gives you valuable insight into the behaviours of its users. Log management is an essential tool in the battle against cyber-crime. It might not be as glamorous as anti-malware software, or the use of honeypots, but it can be the single […]
The eSignature Comes of Age
In recent years, the use of digital or electronic signatures has rapidly increased in an effort to streamline all types of business transactions. The eSignature can not only be used as an actual certifiable signature, just as we did with a pen, but can also be used to encrypt the contents of a document, thus […]
Encryption as the Cornerstone of Big Data Security
Big data refers to huge data sets that come about through the phenomenal growth being seen in the volume of information collected, produced, analysed, shared and stored by organisations. By analysing big data sets, valuable insights can be gained into how patterns of data are associated to enable better-informed decision-making, which can aid in competitiveness […]
Why Encryption is the Best Strategy
Data protection, wherever it resides, must form the core of companies’ security systems. Encryption, in which information is converted from readable format into one that obscures its meaning from those without the authorisation or ability to decipher it, has long been used to protect sensitive information from prying eyes. Data security as a pressing concern
Why passwords must be taken seriously
So, how can businesses ensure that their employees use the best password security to guard their data safely? The Friend Finder Network hack, the largest data breach of 2016 that exposed more than 400 million user accounts, has, once again, highlighted the issue of passwords. Passwords continue to be the bane of our digital lives. […]
Blackmail for a digital age ……
Ransomware is a particularly malicious form of malware that gains access to a user’s system and then proceeds to prevent them from accessing their own data. In some cases, the files on the system are encrypted so as to be irretrievable without the key and, in others, access is simply denied to the device’s owner. […]