Skip to main content

Employee Security – High risk terminations

Employee security: Layoffs are high risk situations.

Employee security really does matter. Your employees are the lifeblood of every organisation. You put a lot of effort into hiring new staff, you train them, you nurture them and in return you get a massive amount of value. However, like it nor not, there will come a point in time when even your best […]

127.0.0.1 redirect causing wordpress connectivity problems.

Wordpress Redirecting to 127.0.0.1 on login

There seems to be a problem with either WordPress or one of its plugins that is redirecting the login script to a non-existent listener on local host (127.0.0.1). At the moment we have implemented a work-around, but any contributors may have difficulty logging in. A quick google search shows that this is happening to other […]

Office security checklist – Updated

Office security checklist – Updated

As part of our ongoing drive towards improving your security, We have updated our office security checklist to make it easier to use and clearer to follow. The 2013 version of the security checklist is now available to download. The idea behind the document remains the same: this is something you can print off and […]

Business Security Guide – Free Download

Business Security Guide – Free Download

The effects of crime can be devastating on people and businesses. While recent crime trends have been reassuring, there is still a reported 1 in 50 businesses in the United Kingdom that suffer a robbery or burglary each year. This can create a terrible economic burden on both the business itself and the surrounding community […]

HMG Security Policy Framework – Version 8

HMG Security Policy Framework – Version 8

You are probably aware that the Cabinet Office have recently issued Version 8 of the Security Policy Framework (SPF). This is the document that provides the overarching framework for security compliance with Government and for any organisations wishing to connect to the Government network or do business with HMG. Previously we have published versions of […]

Essential security audit tool – Backtrack 5 bootable USB

Essential security audit tool – Backtrack 5 bootable USB

For anyone interested in carrying out penetration testing, security audits or other forms of network security self assessment, Backtrack has long been the operating system of choice. Backtrack is a Linux distribution which has been slightly modified to fine tune how it runs various tools used for penetration testing. Booting into Backtrack gives you an […]

Cloud Security – Risks and rewards

Cloud Security – Risks and rewards

There are a lot of business advantages to making use of the cloud for your IT requirements. The ability to make use of shared resources can significantly reduce costs, capital expenditure and simplify your¬†maintenance¬†and upgrade requirements. Even for home users, there is a strong trend towards making use of cloud services – Gmail, GoogleDocs, DropBox […]

Banking Security – Who owns the risks?

Banking Security – Who owns the risks?

Most businesses, when interacting with their financial services provider, assume that they are going to be protected to a certain degree if things go wrong. This may not always be the case. Worryingly, some businesses wont have even considered the situation and are unaware of any risks. It is reasonably clear cut that if someone […]

Security resource downloads – Business Guide to Penetration Testing

Security resource downloads – Business Guide to Penetration Testing

We would always suggest that any business with even half an interest in protecting its resources, carries out regular penetration tests (pentest) – at the bare minimum when a system (physical or IT related) is implemented to ensure that it has been done properly. If you have an internet facing computer system, use e-commerce or […]