Skip to content
Halkyn Security Blog
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us
Menu Close
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us

Author: Taz Wake - Halkyn Security

This author has written 70 articles
Halkyn Security / Archives for Taz Wake - Halkyn Security / Page 3
Read more about the article Data Security – Fines for breaches increasing
ICO Fines Increasing for data breaches

Data Security – Fines for breaches increasing

  • Post author:Taz Wake - Halkyn Security
  • Post published:11 June 2012
  • Post category:Security/Security News

This month has seen a major increase in the fines levied by the Information Commissioner for breaches of the Data Protection Act. Over the last 30 days, there have been over £500,000…

Continue ReadingData Security – Fines for breaches increasing

ICO issues first fine to NHS following data breach

  • Post author:Taz Wake - Halkyn Security
  • Post published:30 April 2012
  • Post category:Security/Security News/Security Risk Management

Today the Information Commissioner's Office announced that a Welsh health board had become the first NHS organisation to be issued with a monetary fine for a breach of the Data…

Continue ReadingICO issues first fine to NHS following data breach

Security Awareness Training – One of the few good security metrics

  • Post author:Taz Wake - Halkyn Security
  • Post published:23 April 2012
  • Post category:Security/Security Education and Awareness

Recently we discussed both the value and problems around developing security metrics as part of your organisations overall management strategy. One of the best metrics you can generate revolves around…

Continue ReadingSecurity Awareness Training – One of the few good security metrics

Risk Management – Not Risk Avoidance

  • Post author:Taz Wake - Halkyn Security
  • Post published:16 April 2012
  • Post category:Security Risk Management

There is a commonly held misconception about risk management and, where this relates to security risk management, it is even more widespread, frequently to the detriment of organisations and businesses.…

Continue ReadingRisk Management – Not Risk Avoidance

Security Metrics – Measure the right thing

  • Post author:Taz Wake - Halkyn Security
  • Post published:10 April 2012
  • Post category:Security/Security Risk Management

Every business needs to have a way of making sure that the money it spends on things is justified by the value those things have to the business. Entire industries…

Continue ReadingSecurity Metrics – Measure the right thing

Transport Security – Protecting your business

  • Post author:Taz Wake - Halkyn Security
  • Post published:2 April 2012
  • Post category:Security

If your business provides tangible objects which have value to customers, then you can be sure that these have value to thieves and other miscreants who want to make a…

Continue ReadingTransport Security – Protecting your business

Scottish Charity Suffers Data Protection Breach

  • Post author:Taz Wake - Halkyn Security
  • Post published:9 March 2012
  • Post category:Security

Another week, another easily prevented data protection breach in the news. This time it is the Glasgow based charity Enable Scotland that is under the spotlight. From the ICO news…

Continue ReadingScottish Charity Suffers Data Protection Breach

Data Protection – Dont forget to sanitise!

  • Post author:Taz Wake - Halkyn Security
  • Post published:2 March 2012
  • Post category:Security/Security News

Staff training is an essential part of every business. The better trained your staff are, the more motivated and efficient they are likely to be. For your training to work,…

Continue ReadingData Protection – Dont forget to sanitise!

Personal Email + Work Activity = High Risk Situation

  • Post author:Taz Wake - Halkyn Security
  • Post published:17 February 2012
  • Post category:Security/Security Education and Awareness/Security Risk Management

Almost everyone has a personal email address, to the point where you are probably more shocked to discover someone who doesnt rather than a person who has several. In recent…

Continue ReadingPersonal Email + Work Activity = High Risk Situation

Protecting your employees, executives and family

  • Post author:Taz Wake - Halkyn Security
  • Post published:10 February 2012
  • Post category:Security/Security Education and Awareness/Security Risk Management

Business are often excellent at cataloguing the importance and value of the physical assets they hold - such as product stock, machinery, company cars etc. Most are even quite good at identifying…

Continue ReadingProtecting your employees, executives and family

5 Reasons why a security consultant can help you

  • Post author:Taz Wake - Halkyn Security
  • Post published:3 February 2012
  • Post category:Security

Every organisation, every home, every club and every charity can benefit from having access to the advice and knowledge of a good independent security consultant. However until fairly recently, it…

Continue Reading5 Reasons why a security consultant can help you

3 critical things every business leader should know about security

  • Post author:Taz Wake - Halkyn Security
  • Post published:20 January 2012
  • Post category:Security/Security Risk Management

There isn't a day without some form of security breach reported on the news and a company or organisation being fined, losing customers, suffering reputational damage etc. Its rare for…

Continue Reading3 critical things every business leader should know about security

Health worker breaches Data Protection Act, gets £1500 fine

  • Post author:Taz Wake - Halkyn Security
  • Post published:13 January 2012
  • Post category:Security/Security Education and Awareness/Security News

Breaches of the Data Protection Act, almost commonplace in 2011, continue into the new year of 2012. As has often been the case, the incident reported this week has been…

Continue ReadingHealth worker breaches Data Protection Act, gets £1500 fine

How to design a password policy

  • Post author:Taz Wake - Halkyn Security
  • Post published:25 November 2011
  • Post category:Security

Passwords are probably the most widely used authentication mechanisms available. They are, on the whole, easy to deploy, easy to explain to users and easy to manage. It is likely…

Continue ReadingHow to design a password policy

Online bingo players details sold

  • Post author:Taz Wake - Halkyn Security
  • Post published:11 November 2011
  • Post category:Security/Security News

Another week, another Data Protection Act breach. Yesterday, the ICO reported on a former employee of an online gambling site who pleaded guilty to selling the personal data belonging to…

Continue ReadingOnline bingo players details sold
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Halkyn Security Tags

Anti Terrorism Asset Protection Breach Business Protection Cloud Computing Company News Compliance Crime Cyber Security Cybersecurity Data Protection DFIR Downloads DPA Encryption European Union Data Protection Financial Government Hacking Halkyn Security Consultants Home Security ICO Identity Management Identity Protection Incident Response Information Security Internet Loss Prevention NHS Office Security Passwords Phishing Physical Security PICERL Risk Management Security Security Awareness Training security education and awareness Security Management Security News Security Risk Management Security Services Security Training Truecrypt Vulnerabilities
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Calendar

May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Nov    

Halkyn Security Posts

  • DFIR on a Shoestring – Incident response for less
  • Linux DFIR: Workflow for a busy responder
  • Linux Incident Response Guide
  • Incident Response Phases – Lessons Learned
  • Incident Response Phases – Recovery
  • Incident Response Phases – Eradication
  • Incident Response Phases – Containment
  • Incident Response Phases – Identification
  • Incident Response Phases – Preparation
  • Incident Response – Process Matters

Follow Us

  • Twitter
Copyright - OceanWP Theme by OceanWP