Another Cyber Attack? Really?

It’s been over a week since the WannaCry ransomware attack that affected the UK’s NHS and yet again it brings into sharp focus the woeful levels of IT security across our public institutions.  The press is full of stories of “viruses” and “worms” rampaging through networks – generally accompanied by a fatalistic acceptance that there’s…

written by

Myths surrounding GDPR

For the past few years a regulation has been plaguing the minds of businesses everywhere, EU GDPR. Now almost 3 years later we know what the regulation will be and when it will come into effect (25th May 2018). But still many business heads are left wondering what it really means and how will it affect…

written by

A new role..

Data Protection Officer Within the regulation it provides that each institution or body must appoint at least one person as a Data Protection Officer (“DPO”) to enforce the regulations internally. This means that any organisation that meet the requirements of performing ‘regular and systematic monitoring of data subjects on a large scale or processing sensitive…

written by

You have 72 hours..

72 Hours Businesses must notify most data breaches to the DPA. This must be done without undue delay within 72 hours of awareness. In some cases, the data controller must also notify the affected data subjects without undue delay. Additionally, the UK ICO, for example, already expects to be informed about all “serious” breaches. Research…

written by

It’s beginning to look a lot like chaos

Please join in, in singing along to our alternative Christmas song to the tune of “It’s beginning to look a lot like Christmas” It’s beginning to look like chaos, Everywhere I glance. Take a look at the firewall, I’m worried it’s going to fall And give an intruder a fighting chance. ———————————————- It’s beginning to look…

written by

Network as a Restaurant…

I will say right up front – I’m a foodie.  I like to cook and I like to dine out too. When I do dine out, I want to choose what I want off the menu – I don’t want to be told what I have to eat. Imagine if you went to a restaurant…

written by

Ho Ho Oh No!

Have you put up your Christmas tree yet?  I did, then I noticed a distinct lack of Christmas cheer from the usually happy bunch of elves I call my children who were struggling with streaming this, facebooking that and whatsapping the other. Their happy little faces were etched with the pain of poor connectivity to…

written by

“The Enemy of My Enemy…”

It’s almost a truism, but cyber criminals will always be ahead of the curve, and everyone else will continually be stuck playing catch up. With no silver bullet “one size fits all” and multiple point solutions all shouting loudly for the attention of customers, it can feel like we are fighting to not be last,…

written by

When Christmas Trees attack!

No, it’s not another take on those mindless pulp TV shows like “When Goldfish/Cats/Toilets Attack” in case you were wondering . . .. The Christmas Tree attack is a real world method of determining the underlying nature of a TCP/IP (Transmission Control Protocol/ Internet Protocol) stack and is often used in the reconnoitre phase of…

written by

Network Enigma: History Repeats?

Encryption has long been valued for securing communications between two parties who do not wish a third to overhear.  The mechanisms for this have steadily become more complex over the years, with one such tool being the Enigma machine. Though the device gained most of its fame, (or infamy), from its extensive use by the…

written by