Blog

/Blog
Blog2017-05-10T12:56:34+00:00

Data Security Strategy

How many businesses have a data security strategy? My guess would be not many. Why? because not many people really understand how to protect their data against the three main data security risks: Security Risks: 1.       Outsider – Malicious threat where someone will try to attack your business, normally to steal data for monetary gain. 2.       Insider – The disgruntled employee stealing company information to either give or take to a competitor. 3.       Accidental – Internal IT user who does something unintentionally.  Of the three, the accidental threat is by [...]

Blaming IT Grinds My Gears

It's been a while since I've made a Peter Griffin-like post in the fashion of his "You know what really grinds my gears..." gag. However today, after watching Paul Pester (great name) on ITV News today, it's highlighted an example of what I see all too often in the world of company-IT. TSB boss insists he has faith in IT department after telling @ITVJoel: 'If you or I trust IT guys every time they tell us it's all going to work fine then we would be in a different business' [...]

By |April 24th, 2018|Grinds my Gears|0 Comments

IT and Business Process

I have two strange obsessions that seem to rule my life. Technology, is perhaps the obvious one. I love tech, anything that can do something, solve a problem, make some part of your life or work smarter, faster or more efficient. I'd say this is a healthy obsession and I'm far from being alone on that. The other, well it's slightly more strange. I seem to be invariably drawn to the way things are done. Processes, policies and procedures. Unhealthy I know, I think I could be a process geek, [...]

By |February 23rd, 2018|Business Process|0 Comments

What does my business have to do for GDPR compliance?

What does my business have to do for GDPR compliance? This is a question I have been asked a lot over the last 6 months. There is a lot information on this subject and I am sure you are getting sick of hearing about it! However, the truth is, GDPR is happening in just over 3-months. This means your business needs to be aware of what it has to do to become compliant or work towards becoming compliant. In this blog I am going to try to answer the question [...]

By |February 16th, 2018|Cyber Security, GDPR|0 Comments

GDPR compliance

Ensure your business is GDPR compliance. To meet GDPR compliance regulations you have to ensure you look at breach notification. This will become a legal requirement of all businesses from May 25th 2018. Which means, that within 72 hours of detecting a data breach, you must inform the supervisory authority. What exactly does this mean? Under GDPR breach notification, a personal data breach is defined as – a security leading to the destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. A very long-winded explanation! But in simple [...]

By |January 16th, 2018|Cyber Security, Uncategorized|0 Comments

Insider Threat

The insider threat is real and it will cost your business. There are two types of insider threat, accidental and malicious. For a cyber-criminal to access your data, they must have access to your network. This is obtained by using compromised user credentials, and can be an employee, contractor, partner or vendor who has access to your network. It is common IT practice to protect your business against outsider threats, but most companies are failing to protect against the insider threat. This is worrying because at least 50% of all [...]

By |November 27th, 2017|Cyber Security, Security|0 Comments