Information Security

/Tag:Information Security
20 09, 2017

Dangers of Public Wi-Fi

By | 2017-09-20T14:15:33+00:00 September 20th, 2017|Cyber Security, Uncategorized|0 Comments

The Dangers of Public Wi-Fi is one of my hot topics of conversation at the many networking events in and around Glasgow that I attend. I have to say, I am becoming a bit paranoid about it, however, I make no apology for bringing it up. Why, you may well ask? Well, let’s cut right [...]

26 06, 2017

The certifiable way to become CISSP certified!

By | 2017-06-26T09:05:54+00:00 June 26th, 2017|Security|0 Comments

Well it’s official, the ISC2 have finally bestowed upon me the prestigious CISSP (Certified Information Systems Security Professional) accreditation! I started my journey almost two years ago, just as the new 8 domain material came out.  Despite taking two years to sit the exam (will tell you why later), I managed to pass first time!  [...]

8 05, 2017

The differences between GDPR and Data Protection Act?

By | 2017-05-08T13:27:43+00:00 May 8th, 2017|Security|0 Comments

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. [...]

10 04, 2017

Examples of Cyber Attacks

By | 2017-04-18T15:07:55+00:00 April 10th, 2017|Uncategorized|0 Comments

We all know that cyber attacks are on the increase, but not many of us actually know what it is, or how it effects us. So, I would like to share two examples with you. Cyber Attacks Example  1 - Know who you are dealing with. A large UK multinational centralised their finance function. As part [...]

24 10, 2016

Dyn DNS DDoS – understanding the cyber security terminology!

By | 2016-10-26T08:45:37+00:00 October 24th, 2016|Security|0 Comments

I’ll refrain using the term cyber security for the rest of this blog, let’s face it – it’s so 1990s!  Which brings me neatly to my first point – IT security the hardest part is understanding the terminology! Denial of Service - DoS This weekend’s cyber (damn, didn’t mean to use that -Ed) attack on [...]

31 05, 2016

Unleashed Guide to Ransomware

By | 2016-10-26T08:45:38+00:00 May 31st, 2016|Business Continuity, Security|0 Comments

What is Ransomware? Ransomware is not new and the first cases of CryptoLocker started back in 2013 and most attacks tends to come for outwith the UK.  Ransomware has now become so fruitful that many cyber criminals are now running it as a business!  To the extent of selling lists of infected and vulnerable PC's and Servers to [...]

1 02, 2016

Help to mitigate cyber attacks

By | 2016-02-01T17:02:47+00:00 February 1st, 2016|Security|0 Comments

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

13 01, 2016

What does Brexit mean for UK Data Protection?

By | 2016-10-26T08:45:42+00:00 January 13th, 2016|Security|0 Comments

Brexit.  Leaving the EU and it’s laws.  As a long time geek I’ve had the principles of the UK Data Protection Act drummed into me since I studied GCSE IT. It is the foundation of how we lay out the responsibility and liability for the care of the personal data we share with companies and [...]

28 04, 2015

Cyber Security and are we doing enough?

By | 2015-11-18T14:45:19+00:00 April 28th, 2015|Security|0 Comments

Whether we like it or not, we now live in a digital age, this means living by digital standards. This means businesses Large or Small have to protect what is rightfully theirs. Cyber Security is on the increase, the amount of attacks, viruses and malware has increased ten-fold and become more sophisticated. So what does [...]

25 03, 2014

If you value your information security, then it’s time to buy new PC’s

By | 2016-10-26T08:46:16+00:00 March 25th, 2014|Business Continuity, Infrastructure, Security, Unleashed|Comments Off on If you value your information security, then it’s time to buy new PC’s

At As I sit in the bar on a fine evening après-ski writing this article, I’m pretty much trying to convey the same attitude to a little unknown problem outside the world of IT as other business owners and managers are. I mean, I can literally close my eyes and absolutely not care what Microsoft’s [...]

8 03, 2013

Legal Sector Information Security – Knowing your COLP’s from your COFA’s

By | 2017-04-10T08:33:17+00:00 March 8th, 2013|Security|Comments Off on Legal Sector Information Security – Knowing your COLP’s from your COFA’s

In the early days of January this year, I had the opportunity to get involved with some work going on in the legal sector. Always keen to gain new skills and more in-depth knowledge of other sectors than my traditional specialisms, I jumped at the chance and headed down to London for a morning with [...]