North Wales Cyber Security Cluster – April 2016 Meeting
The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn…
The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn…
In the northern hemisphere at least, winter is now upon us and this is time for all business owners to think about how well their business can cope if the…
Last month (27 March), the security and cryptography expert Bruce Schneier posted an article on his blog about Security Awareness Training. Now, it should go without saying that Bruce Schneier…
As part of our ongoing drive towards improving your security, We have updated our office security checklist to make it easier to use and clearer to follow. The 2013 version…
Today the Information Commissioner's Office (ICO) announced it had produced "A practical guide to IT Security" with the subheading that this is "Ideal for the small business." At the time…
Recently we discussed both the value and problems around developing security metrics as part of your organisations overall management strategy. One of the best metrics you can generate revolves around…
Almost everyone has a personal email address, to the point where you are probably more shocked to discover someone who doesnt rather than a person who has several. In recent…
Business are often excellent at cataloguing the importance and value of the physical assets they hold - such as product stock, machinery, company cars etc. Most are even quite good at identifying…
Breaches of the Data Protection Act, almost commonplace in 2011, continue into the new year of 2012. As has often been the case, the incident reported this week has been…
For lots of people and businesses of all sizes, security is viewed as something which is an unfortunate cost that simply has to be tolerated. In effect, this gives rise…
Security is important. Security underpins pretty much every activity you are engaged in - be it at work or at home. From a business perspective, security can be the difference…
Despite recent popular opinion and some well publicised hacks involving them, passwords are not intrinsically weak. When used properly, they are a perfectly good, single factor, method of authentication. The important part…
One of the most overlooked risks of using the internet is the fact that most of the time your data is as private as the writing on the back of…
Passwords are frequently thought of as an "outdated" method of security and numerous product vendors will tell you how they offer a much better solution that kind of works like…
Phishing is an on-going threat to most businesses and home users. It is safe to assume that there will be a constant stream of phishing emails sent to pretty much…