History of Cryptography

By Alex Probert Cryptography has been detached from steganography, which was used to conceal important messages. It has been around since pre-1900 BC; one device was called the Scytale, which was a wooden stick with a long scroll attached with random letters on it. To decrypt the message, the user would need to wrap the […]

READ MORE

Is your system safe from fraud? Fingers crossed…

67% of the millions of daily SME “hacking” attempts are now targeted at telephone systems. By comparison, SQL servers – which represented the second-most attacked category – accounted for only 4% of attacks. Given these hacking attacks are now running 24/7 on hundreds of powerful servers, with software specifically designed to detect telephone systems, it’s […]

READ MORE

What would happen if your company data falls into your competitors hands?

There is a new EU Data Protection Reform coming in 2015: “The changes will have a huge bearing on businesses as far as information compliance is concerned; breached businesses must pay fines of up to 5% of gross turnover, report breaches within 72 hours (interestingly, the notice mentions “if feasible within 24 hours”), and employ […]

READ MORE