Blog

Home/Blog
Blog 2017-05-10T12:56:34+00:00

The certifiable way to become CISSP certified!

Well it’s official, the ISC2 have finally bestowed upon me the prestigious CISSP (Certified Information Systems Security Professional) accreditation! I started my journey almost two years ago, just as the new 8 domain material came out.  Despite taking two years to sit the exam (will tell you why later), I managed to pass first time!  I am now certifiable! Awfully chuffed with myself, but I can tell you having not done a ‘proper’ exam in around ten years, it was amongst the hardest things I’ve ever done.  A six-hour exam [...]

By | June 26th, 2017|Security|0 Comments

How secure is your network?

How secure is your network and if asked can you prove it? We have written a lot over the past few months about different aspects of IT cyber security. But fundamentally, it all comes down to one thing, how secure is your network? I could ask this question to 20 IT Managers and get 20 different answers, so my next question to you guys. Can you prove your network is secure? IT Security is a science and covers many different layers. The government has brought out Cyber Essentials as a [...]

By | June 13th, 2017|Uncategorized|0 Comments

What IT Managers should be doing about the NHS Cyber Attack

NHS Cyber Attack Yesterday, the 12th of May 2017, there was what the media are calling a 'massive cyber attack' against the NHS.  I'm in agreement with a former leading figure at GCHQ, Brian Lord, who was interviewed on BBC Breakfast News this morning.  He stated that calling this a 'cyber attack' is somewhat misleading and sensational in the press. Ultimately, as I've argued before about the term cyber security - it brings up pictures in the public mind of films like Hackers where there's someone sat at the other end [...]

By | May 13th, 2017|Security|0 Comments

What the heck is GDPR and why should an IT Manager care?

Here’s the scene Everyone and their dog in IT reseller land is sending you out hundreds of emails a week about GDPR. You’ve got users with problems breathing down your neck who won’t leave your desk until you’ve reset their password, which if they’d only just remember them you’d get some work done. You’ve also got those ‘special’ users who should be removed from all electronics and at the very least be spoon bending on TV or the worst ones should be on Netflix’s Stranger Things. So… Have you looked [...]

By | May 12th, 2017|Security|0 Comments

The differences between GDPR and Data Protection Act?

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. The differences between GDPR and Data Protection Act? After extensive research, and taking information from many different sources. I can now highlight some of the differences between GDPR and Data Protection Act. The Data Protection [...]

By | May 8th, 2017|Security|0 Comments

GDPR an idiots guide

GDPR an idiots guide - General Data Protection Regulations GDPR an idiots guide, has been written because Unleashed visited IP Expo in Manchester last week. It was great to meet some old friends and make some new ones. The general theme this year amongst a lot of the vendors was GDPR. Nearly everyone mentioned it in their literature, which is great. The only problem, is no-one really know what it means or how is going to affect their business! As a result. I have decided, on your behalf, to go through available information [...]

By | May 2nd, 2017|Uncategorized|0 Comments