Personal Email + Work Activity = High Risk Situation
Almost everyone has a personal email address, to the point where you are probably more shocked to discover someone who doesnt rather than a person who has several. In recent…
Almost everyone has a personal email address, to the point where you are probably more shocked to discover someone who doesnt rather than a person who has several. In recent…
There isn't a day without some form of security breach reported on the news and a company or organisation being fined, losing customers, suffering reputational damage etc. Its rare for…
As we mentioned recently, the UK Government has released an updated version of the Security Policy Framework (SPF), which details the security requirements for government agencies and departments. It also…
Security risk management is, as we frequently say, important for every organisation. For most businesses it can be a make or break issue and, in lots of industries, there are…
Proper management of risk is essential to every organisation. Although frequently seen in a negative light, risk is simply an uncertainty of outcome and routinely accompanies new opportunities. Poor risk…
We all make typos - nearly everyone suffers from the effects of fingers and brains going out of sync - and it is why the most important tool in any…
Security is built upon the bedrock of risk management, but this is frequently overlooked and instead things are left to chance. Every activity carries risk and nothing can ever provide…
Security is important. Security underpins pretty much every activity you are engaged in - be it at work or at home. From a business perspective, security can be the difference…
A report in New Scientist magazine this week identifies a new threat to your information security, although it is unclear if this is in the wild yet. In the article,…
News reports are coming into today of a terrorist attack in Norway. It appears that a gunman opened fire on a youth conference on the island of Utoya, killing four…
There are a lot of business advantages to making use of the cloud for your IT requirements. The ability to make use of shared resources can significantly reduce costs, capital…
Most businesses, when interacting with their financial services provider, assume that they are going to be protected to a certain degree if things go wrong. This may not always be…
It is often stated that "staff are the most important asset" to any business yet frequently employers fail to take the correct steps to ensure the security of their staff.…
We would always suggest that any business with even half an interest in protecting its resources, carries out regular penetration tests (pentest) - at the bare minimum when a system…
Halkyn Security have provided a new security resource for general download. The Information Security Classification Guide is provided to help businesses and enterprises of all sizes develop a coherent and…