Cyber Security

/Cyber Security

Cyber Security

19 09, 2018

Cyber Kill Chain

By |2018-09-19T12:17:09+00:00September 19th, 2018|Cyber Security, GDPR, Security, Unleashed|0 Comments

What is the cyber kill chain? To explain what this is, we first have to look at the whole process of the cyber-attack. To stop a cyber-attack, you first have to understand the process that the purveyor of the attack goes through. And, more importantly, know what the end goal of the attack is. There [...]

7 09, 2018

Why did the British Airways Data Theft Happen?

By |2018-09-07T15:02:02+00:00September 7th, 2018|Cyber Security|0 Comments

British Airways, or as us self-respecting Northerners call it - "Heathrow Airways" has suffered a large data theft.  This has come in a string of IT Debacles that have occurred over the last 18 months. In July, there were IT issues causing some flights in and out of Heathrow to be cancelled.   The month before, [...]

7 06, 2018

Data Security Strategy

By |2018-06-07T15:06:09+00:00June 7th, 2018|Cyber Security, Disaster Recovery, GDPR, Security, Unleashed|0 Comments

How many businesses have a data security strategy? My guess would be not many. Why? because not many people really understand how to protect their data against the three main data security risks: Security Risks: 1.       Outsider – Malicious threat where someone will try to attack your business, normally to steal data for monetary gain. [...]

16 02, 2018

What does my business have to do for GDPR compliance?

By |2018-02-16T13:47:46+00:00February 16th, 2018|Cyber Security, GDPR|0 Comments

What does my business have to do for GDPR compliance? This is a question I have been asked a lot over the last 6 months. There is a lot information on this subject and I am sure you are getting sick of hearing about it! However, the truth is, GDPR is happening in just over [...]

16 01, 2018

GDPR compliance

By |2018-10-29T15:29:33+00:00January 16th, 2018|Cyber Security, Uncategorized|0 Comments

Ensure your business is GDPR compliance. To meet GDPR compliance regulations you have to ensure you look at breach notification. This will become a legal requirement of all businesses from May 25th 2018. Which means, that within 72 hours of detecting a data breach, you must inform the supervisory authority. What exactly does this mean? [...]

27 11, 2017

Insider Threat

By |2018-04-24T21:20:43+00:00November 27th, 2017|Cyber Security, Security|0 Comments

The insider threat is real and it will cost your business. There are two types of insider threat, accidental and malicious. For a cyber-criminal to access your data, they must have access to your network. This is obtained by using compromised user credentials, and can be an employee, contractor, partner or vendor who has access [...]

25 10, 2017

GDPR Breach Notification

By |2017-10-25T14:35:58+00:00October 25th, 2017|Cyber Security|0 Comments

GDPR breach notification will become the duty of all businesses from May 25th 2018. This means, that within 72 hours of detecting a data breach, you must inform the supervisory authority. What exactly does this mean? Under GDPR breach notification, a personal data breach is defined as – a security leading to the destruction, loss, [...]

10 10, 2017

GDPR, Confused?

By |2017-10-10T13:27:59+00:00October 10th, 2017|Cyber Security, Infrastructure, Security, Technology, Unleashed|0 Comments

GDPR, Confused? Well everyone I have spoken to certainly is! In fact, it has taken me nearly 3 months to get to the bottom of what IT Directors/Managers have to do to ensure you are GDPR (General Data Protection Regulations) compliant. In one sense it is quite funny that the search term GDPR, Confused? Gets [...]

20 09, 2017

Dangers of Public Wi-Fi

By |2017-11-09T14:48:15+00:00September 20th, 2017|Cyber Security, Uncategorized|0 Comments

The Dangers of Public Wi-Fi is one of my hot topics of conversation at the many networking events in and around Glasgow that I attend. I have to say, I am becoming a bit paranoid about it, however, I make no apology for bringing it up. Why, you may well ask? Well, let’s cut right [...]

22 08, 2017

Protecting your business from Cyber Attack

By |2017-08-22T13:39:37+00:00August 22nd, 2017|Cyber Security|0 Comments

Protecting your business from cyber attack should be the first thing on the agenda of every board meeting. Why? Because if you do have a strategy of protecting your business from cyber attack then you are potentially putting your business at risk. You may have heard the quote; ‘There are only two types of business [...]

10 08, 2017

Your Local Cyber Security Experts

By |2017-08-10T14:57:36+00:00August 10th, 2017|Cyber Security, Uncategorized|0 Comments

Your local cyber security experts, bold statement or true fact? In truth only our customers can answer that question, but if asked I am sure they will back us up. Unleashed, have two main areas of operations Glasgow and the central belt to Edinburgh and Manchester along the M62 corridor which covers Leeds and Liverpool. [...]