chrisgilmour

/Chris Gilmour

About Chris Gilmour

Chris, is a IT Security Consultant who is passionate about IT. We regularly find that cyber security is an afterthought. When really it should be the keystone your business is built on. Chris, is a qualified Cyber Essentials Consultant who can help your business to built a cyber security strategy. This will not only protect your business but could also save it. GDPR comes in next year - are you ready? if not speak to Chris and he can help you.
19 09, 2018

Cyber Kill Chain

By |2018-09-19T12:17:09+00:00September 19th, 2018|Cyber Security, GDPR, Security, Unleashed|0 Comments

What is the cyber kill chain? To explain what this is, we first have to look at the whole process of the cyber-attack. To stop a cyber-attack, you first have to understand the process that the purveyor of the attack goes through. And, more importantly, know what the end goal of the attack is. There [...]

10 09, 2018

It won’t happen to me…

By |2018-09-10T08:55:33+00:00September 10th, 2018|Unleashed|0 Comments

Do you have an “it won't happen to me” disaster recovery policy? If so, you may want to read this! Everybody thinks they are protected. That a disaster is not going to happen to them, correct? Well, what if a disaster that has nothing to do you happens, and stops you from doing business. I [...]

7 06, 2018

Data Security Strategy

By |2018-06-07T15:06:09+00:00June 7th, 2018|Cyber Security, Disaster Recovery, GDPR, Security, Unleashed|0 Comments

How many businesses have a data security strategy? My guess would be not many. Why? because not many people really understand how to protect their data against the three main data security risks: Security Risks: 1.       Outsider – Malicious threat where someone will try to attack your business, normally to steal data for monetary gain. [...]

16 02, 2018

What does my business have to do for GDPR compliance?

By |2018-02-16T13:47:46+00:00February 16th, 2018|Cyber Security, GDPR|0 Comments

What does my business have to do for GDPR compliance? This is a question I have been asked a lot over the last 6 months. There is a lot information on this subject and I am sure you are getting sick of hearing about it! However, the truth is, GDPR is happening in just over [...]

16 01, 2018

GDPR compliance

By |2018-10-29T15:29:33+00:00January 16th, 2018|Cyber Security, Uncategorized|0 Comments

Ensure your business is GDPR compliance. To meet GDPR compliance regulations you have to ensure you look at breach notification. This will become a legal requirement of all businesses from May 25th 2018. Which means, that within 72 hours of detecting a data breach, you must inform the supervisory authority. What exactly does this mean? [...]

27 11, 2017

Insider Threat

By |2018-04-24T21:20:43+00:00November 27th, 2017|Cyber Security, Security|0 Comments

The insider threat is real and it will cost your business. There are two types of insider threat, accidental and malicious. For a cyber-criminal to access your data, they must have access to your network. This is obtained by using compromised user credentials, and can be an employee, contractor, partner or vendor who has access [...]

8 11, 2017

Safe, Secure and Prosperous

By |2017-11-08T15:51:31+00:00November 8th, 2017|Uncategorized|0 Comments

Public Sector Action Plan on Cyber Resilience Safe, Secure and Prosperous is the Scottish Government tagline for the Public-Sector Action Plan on cyber resilience (Cyber - Public Sector Action Plan - FINAL - Public Sector Action Plan 2017-18). Although this is mainly aimed at the public sector in Scotland, it is just as relevant to [...]

25 10, 2017

GDPR Breach Notification

By |2017-10-25T14:35:58+00:00October 25th, 2017|Cyber Security|0 Comments

GDPR breach notification will become the duty of all businesses from May 25th 2018. This means, that within 72 hours of detecting a data breach, you must inform the supervisory authority. What exactly does this mean? Under GDPR breach notification, a personal data breach is defined as – a security leading to the destruction, loss, [...]

10 10, 2017

GDPR, Confused?

By |2017-10-10T13:27:59+00:00October 10th, 2017|Cyber Security, Infrastructure, Security, Technology, Unleashed|0 Comments

GDPR, Confused? Well everyone I have spoken to certainly is! In fact, it has taken me nearly 3 months to get to the bottom of what IT Directors/Managers have to do to ensure you are GDPR (General Data Protection Regulations) compliant. In one sense it is quite funny that the search term GDPR, Confused? Gets [...]

20 09, 2017

Dangers of Public Wi-Fi

By |2017-11-09T14:48:15+00:00September 20th, 2017|Cyber Security, Uncategorized|0 Comments

The Dangers of Public Wi-Fi is one of my hot topics of conversation at the many networking events in and around Glasgow that I attend. I have to say, I am becoming a bit paranoid about it, however, I make no apology for bringing it up. Why, you may well ask? Well, let’s cut right [...]

22 08, 2017

Protecting your business from Cyber Attack

By |2017-08-22T13:39:37+00:00August 22nd, 2017|Cyber Security|0 Comments

Protecting your business from cyber attack should be the first thing on the agenda of every board meeting. Why? Because if you do have a strategy of protecting your business from cyber attack then you are potentially putting your business at risk. You may have heard the quote; ‘There are only two types of business [...]

10 08, 2017

Your Local Cyber Security Experts

By |2017-08-10T14:57:36+00:00August 10th, 2017|Cyber Security, Uncategorized|0 Comments

Your local cyber security experts, bold statement or true fact? In truth only our customers can answer that question, but if asked I am sure they will back us up. Unleashed, have two main areas of operations Glasgow and the central belt to Edinburgh and Manchester along the M62 corridor which covers Leeds and Liverpool. [...]

27 07, 2017

Cyber Security for the Sole Trader

By |2017-07-28T13:43:43+00:00July 27th, 2017|Uncategorized|0 Comments

Cyber security for the sole trader. I do a lot of networking events and talk a lot about Cyber Security. However, my focus, tends to be on how SME’s and Corporate companies should be better protected, and how they should mitigate risk. But during a conversation this morning, I started talking to a lovely lady [...]

3 07, 2017

What makes a good Cyber Security Consultant?

By |2017-07-03T10:01:00+00:00July 3rd, 2017|Uncategorized|0 Comments

What makes a good cyber security consultant? As cyber-crime rises, it seems every IT person is now a cyber security expert. However, with so much information floating around how do you separate the wheat from the chaff? Well, Unleashed, is here to help you decide. As we have said many times, in various posts over [...]

13 06, 2017

How secure is your network?

By |2017-06-13T09:07:25+00:00June 13th, 2017|Uncategorized|0 Comments

How secure is your network and if asked can you prove it? We have written a lot over the past few months about different aspects of IT cyber security. But fundamentally, it all comes down to one thing, how secure is your network? I could ask this question to 20 IT Managers and get 20 [...]

8 05, 2017

The differences between GDPR and Data Protection Act?

By |2017-05-08T13:27:43+00:00May 8th, 2017|Security|0 Comments

What are the differences between GDPR and Data Protection Act? Following on from my blog on 2nd May 2018 – GDPR an Idiots Guide. Someone asked me the question, what are the differences between GDPR and Data Protection Act? Good question I said, let me do a bit of research and I will come back to you. [...]

2 05, 2017

GDPR an idiots guide

By |2018-02-23T10:05:59+00:00May 2nd, 2017|GDPR|0 Comments

GDPR an idiots guide - General Data Protection Regulations GDPR an idiots guide, has been written because Unleashed visited IP Expo in Manchester last week. It was great to meet some old friends and make some new ones. The general theme this year amongst a lot of the vendors was GDPR. Nearly everyone mentioned it in their [...]

10 04, 2017

Examples of Cyber Attacks

By |2017-04-18T15:07:55+00:00April 10th, 2017|Uncategorized|0 Comments

We all know that cyber attacks are on the increase, but not many of us actually know what it is, or how it effects us. So, I would like to share two examples with you. Cyber Attacks Example  1 - Know who you are dealing with. A large UK multinational centralised their finance function. As part [...]