Information Security

How To Keep Yourself (And Your Company) Safe From Hackers

Jeremy Bergsman | Posted 25.07.2017 | UK Tech
Jeremy Bergsman

Co-authored by Daria Kirilenko, research consultant at CEB, now Gartner Cyberattacks feature prominently in the news almost every week. While externa...

Why We Should All Be Worried About Information Governance Compliance In UK Health And Care

Dr Felix Jackson | Posted 20.07.2017 | UK Tech
Dr Felix Jackson

The answer is that using such consumer focused tech to have clinical discussions is often illegal as it is could potentially breach the UK Data Protection Act, not to mention the NHS Act 2006, the Health and Social Care act 2012 and the Human Rights Act.

Bees, Bears, And BotNets

Mike Ahmadi | Posted 06.07.2017 | UK Tech
Mike Ahmadi

I want to tell a story. Hang in there with me for a bit. Almost 2 years ago, I bought a home in Mariposa California, which sits in the Sierra Nevada mountains, and is the home county for the spectacular Yosemite National Park. I fell in love with the area on my first visit over a decade ago, and longed for my own place in the serene setting for years.

Sobering Thoughts When a Connected Medical Device Is Connected to You

Jim Ivers | Posted 05.07.2017 | UK Tech
Jim Ivers

Security is pervasive in our scenario--both physical security and protection from external attack as a connected device. The software must authenticate the operator of the device to ensure that it cannot be improperly used by an unauthorized person. Since the device is protected, the software must also be protected against attacks that allow for remote operation of the device or exfiltration of patient data.

Will The Lack Of Skills Hamper The Government Ambition For Increased Cyber Security?

Anthony Sherick | Posted 03.11.2016 | UK Tech
Anthony Sherick

To build a booming market for talent, this should include subsidised training for individuals and corporates, apprenticeships and particularly a strong effort or financial incentives to grow the take up and offerings of Cyber Security degrees. Promotion and awareness of the industry and the opportunities available needs to be wide reaching.

Five Password Tips for Better Small Business Security

Mike Foreman | Posted 07.04.2015 | UK Tech
Mike Foreman

Ever since the commercialization of the World Wide Web in the late '90s, passwords have been a front-line security method for doing business online. Yet, despite huge advances in technology, password practices for the majority of people have not evolved that much.

Why Auditors Must Re-Focus on Information Risks

Ian Beale | Posted 24.08.2014 | UK
Ian Beale

Given the numerous data breaches and the revelation of the Heartbleed Bug over the course of the last few months, I want to revisit a topic we discussed back in February: information security risk. In today's all-digital world, information security is a risk that threatens firms of all sizes.

NSA Intel Goldmine, Who Else Has Access?

Arjen Kamphuis | Posted 15.11.2013 | UK Politics
Arjen Kamphuis

Nobody, including the NSA, Edward Snowden, Glenn Greenwald has a total oversight of all the in the tens of thousands of documents let alone the political or strategic implications of the info contained in them. Most of the news keeps focusing on the 'scandal' aspect and/or the person of Snowden...

An Information Storm In A Teacup

Christian Toon | Posted 06.08.2013 | UK Tech
Christian Toon

The internet cafe can appear a practical godsend. It sounds simple enough, doesn't it? But just how secure are internet cafes? And, more importantly, how safe is your information going to be?

Privacy, A Decade On

Arjen Kamphuis | Posted 01.04.2013 | UK Tech
Arjen Kamphuis

Terrorism is obviously the "access all areas pass" - but many more Europeans die slipping in the shower or from ill-fitting moped helmets than from "terrorism".

IT and Government, What to Do?

Arjen Kamphuis | Posted 20.11.2012 | UK Tech
Arjen Kamphuis

Two months ago I, along with other "experts", attended  a Parliamentary Working Group to answer questions about government IT projects. This was a Parliamentary group of MPs investigating the many IT failures of the government.

Why Justin Bieber is the Only Hope Left for Information Security

Dominique Karg | Posted 21.10.2012 | UK Tech
Dominique Karg

I recently had an eye opening experience. My wife confessed to me, in tears, that she liked Justin Bieber's music. She asked for forgiveness, as I walked out of the room mumbling some unrepeatable curse words.