Blog

Welcome to our blog, feel free to to post, comment or whatever you'd like to do

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, […]

The increasing popularity of drones and remote technology роѕеѕ increasing cyber ѕесurіtу rіѕk, рrоmрtіng thе FAA to іѕѕuе nеw cyber security guidelines requiring all оwnеrѕ оf 0.5- tо 55-роund drones tо rеgіѕtеr their mасhіnеѕ wіth thе аdmіnіѕtrаtіоn. In аddіtіоn tо physical ѕесurіtу соnсеrnѕ, dо drоnе оwnеrѕ also nееd tо be concerned about mitigating cyber risk? […]

BYOD (Bring your own device): Bringing your own device has become a popular way to work in today’s world. Not only can it potentially help business owners to save money but it can also make sure that all staff members have access to the programs that they need even during off hours. While bring your […]

THE INTANGIBILITY OF CYBER INSURANCE The worry of states and organisations who face cybercrime has given rise to new regulations and enforces new techniques to decrease the dangers or their effects. Among them, there is cyber insurance. It is somewhat situated on two tomahawks: The primary concerns the recuperation of costs identified with a cybercriminal […]

Voodootec CEO, Doug Drummond, had the pleasure of interviewing Nexthink Sales Director Steve Little for his opinion on the newest version of the software. What do you think are the most appealing and innovative features for the new version? In the new version, End-user Analytics is truly made easy. Nexthink V6 raises End-user Analytics to […]

As Christmas is approaching, everyone is busy online shopping at this festive season, however it is essential to maintain safety during online shopping. We all know that hackers keep a close eye on our online activities and particularly on ecommerce actions because they get the probability to steal our credit card information and identity from […]

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into […]

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, […]

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into […]

There is no excerpt because this is a protected post.

http://secretlab.pw Easy-to-Use WordPress Themes with Top-Notch Support

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using ‘Content here, content here’, making it look like readable English.

Welcome to image alignment! The best way to demonstrate the ebb and flow of the various image positioning options is to nestle them snuggly among an ocean of words. Grab a paddle and let’s get started.

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using ‘Content here, content here’, making it look like readable English. Many […]

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don’t look even slightly believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn’t anything embarrassing hidden in the middle […]

Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!

Cyber Security is all over the news – whether it’s the latest hack, a new type of threat or a global company leak. Many companies are featuring in the news following being a victim of the above all focuses on one thing. Too often we are seeing “our systems failed”, “our data missed the risk” […]

If the answer is yes, we are very worried. The problem lies within the fact you may be relying on the one security feature. Following the latest worldwide incidents, there has been a focus on hackers trying to attain customer information. This often contains, names, email addresses, passwords and any vital information that can cause […]

Are you being told or do you know where your company risk is? There is an increasing trend happening in the IT and Cyber Security, it is a trend that has always been present, but as new technologies arise, new problems appear. The latest high profile breach. A new type of attack. Welcome to the […]

How Cyber Security experts stay safe online.  Cyber Security is a notorious topic within board rooms due to so many high profile attacks making headline news. With many large corporations being targeted, it is a fascinating time to be working within the industry and exciting to see how future developments lead the cyber security industry […]

So you thought compliance was boring… Businesses have a habit of growing, and as they do so the rules become more stringent. It’s called governance and smaller businesses aren’t much taken with it; the people who bootstrapped their companies by the seat of their pants tend to regard it all as a bit of red […]

Ask 100 security ‘professionals’ what vulnerability management is and at least half of them will begin with patching, another 25% will focus on vulnerability scanning and penetration testing, and the majority of the rest will start quoting the gamut of Risk Assessment to Business Continuity. I’m not saying they are wrong, but most will not be […]

What is Managed File Transfer? Long gone are the days of photo copiers and fax machines; managed file transfer is now the universal voice of data sharing and cooperative working. As the digital age has been adopted in to almost all industries, access to your data anywhere is essential. Whether it is from a computer, […]

The recent OPM cyber breach at the U.S. Government’s Office of Personnel Management (OPM) provided a wakeup call to the seriousness and sophistication of the cyber security threat aimed at both the public and private sectors. The fact is that over 43% of companies had breaches last year (including mega companies such as Home Depot, […]

We have attended may data classification and security events over the last few years. This year at Manchester IP Expo we had the benefit of meeting many people within the sector. We got chatting with Carrie from Sales Way who interviewed us. The following is how it ended up: Many industry analysts are citing the […]

I often think that “risk management” is a misnomer. You don’t actually manage risk. For all of the claims made by the statisticians, there’s pretty much a polar element to any risk of attack, cyber or otherwise. Either you’ll get attacked or you won’t; I calculate that at 50/50. Mitigate that with the amount of […]

With so many data breach incidents occurring in the news we have decided to hold an event. Having attended the Fitch Ratings event regarding cyber security within the insurance sector, it was fascinating to hear the views of underwriters, brokers and managing agents within the cities. We are therefore hosting a breakfast event on Tuesday 14th July […]

Ever wonder why data breaches are now called cyber attacks, or an application on the Internet is now called The Cloud? It’s for the same reason that Coca Cola is constantly changing it’s ‘look’, adding ‘new’ flavours of what is basically the same sugary mess, and why they’ve changed their slogan FORTY SEVEN times in […]

Security in a business is about technology by all means, but it’s also about management. Lots of companies risk non-compliance in spite of having all their IT up to date, firewalled and ring-fenced, because they have failed to communicate a few concepts to their personnel. Take the High Street retailer whose technical compliance and social […]

When you look at data security from a high level, so many things stand out as critically important that’s it’s difficult to determine which are the MOST important. Senior Leadership buy-in, Governance, Risk Management, Asset Management and so on must be in place for a program to work, and the entire program fails if any one […]

Data breach and the information security sector is rife with negativity and pronouncements of doomsday, and while the title is no better, this blog is not meant to scare, but to provide an alternative view of the worst case scenario; a data breach and resulting forensics investigation. The fact remains that if your data is […]

Have you maximised your security for DDoS attacks? Due to the increasing number of DDoS (Distributed Denial of Service) attacks, a majority of corporate companies are bringing in preventative measures. The process which can take over the entire server within minutes has proved that the highest security systems, such as firewall and software, which are […]

Cyber Security for the basic user Whether you’re an individual or a small business there are a number of basics that you can learn about cyber security to protect yourself for the future. Here are some basic tips about cyber security that can protect you online or help to protect your business if you plan […]