70 Days until GDPR becomes law…

70 x Days until your business must comply with new Europe wide General Data Protection Regulation 70 x Days until the Information Commissioners Office can require your business to demonstrate its compliance 70 x Days until the fines for non-compliance or Data loss jump 40 x fold The ICO and the Government are absolutely serious […]

READ MORE

Password Problems: Young Brits & Password Protection

By Tyrese Garvie Experian’s latest survey shows that young Brits (aged 18 – 25) could face a ‘credential crisis’ of sorts if they don’t brighten up when it comes to password protection. “52% of the UK’s youth reuse their email password for a number of online accounts.” Yes, I know, reusing your password isn’t the cyber-security […]

READ MORE

Carphone Warehouse fined £400,00

“Left its systems vulnerable by failing to update its software and carry out routine testing” (The Information Commissioners Office in its $400,000 judgement about Carphone Warehouse) Is this you and your business? If you ask Your IT people are sure to say “you’re OK” – but the truth is yes! Few UK SMEs have: A […]

READ MORE

The Dunning-Kruger Effect & Cyber Security

By James Pink The Dunning-Kruger Effect… The psychological term for someone who believes they understand enough not to be caught out, but this illusory superiority leads them to be caught out by the very thing they think they understand. A perfect example: Many people think they understand what a Phishing Attack looks like… until they […]

READ MORE

What is Spectre and Meltdown?

By Alex Probert Two vulnerabilities have been identified on the main part of a computer component, this component is the processor. The processor’s main job is to handle instructions from the user with input and output operations. The processor will essentially predict the information that it may need to improve speed and performance, this is […]

READ MORE

History of Cryptography

By Alex Probert Cryptography has been detached from steganography, which was used to conceal important messages. It has been around since pre-1900 BC; one device was called the Scytale, which was a wooden stick with a long scroll attached with random letters on it. To decrypt the message, the user would need to wrap the […]

READ MORE