Skip to content
Halkyn Security Blog
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us
Menu Close
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us

Security

Halkyn Security / Security / Page 3
Read more about the article Retail security in an online world
Retail security threats - triangulation attack workflow.

Retail security in an online world

  • Post author:Taz Wake - Halkyn Security
  • Post published:21 February 2015
  • Post category:Security

The internet has been changing the world for decades now, and nowhere has this been more obvious than the retail sector. Internet access has opened up new markets, invented new…

Continue ReadingRetail security in an online world
Read more about the article Retail security, business protection, loss reduction
The retail sector remains vulnerable to cyber attacks

Retail security, business protection, loss reduction

  • Post author:Taz Wake - Halkyn Security
  • Post published:20 January 2015
  • Post category:Security/Security News

Retail security is in the news again as the British Retail Consortium (BRC) report that crime in this sector has reached a 10 year high. This reporting appears to indicate…

Continue ReadingRetail security, business protection, loss reduction
Read more about the article Insider Threat – Apple Employee Jailed and Fined
Crime can result in jail for insiders

Insider Threat – Apple Employee Jailed and Fined

  • Post author:Halkyn Security
  • Post published:9 December 2014
  • Post category:Security

The insider threat is in the news again. On 8 December it was reported that ex-Apple employee, Paul Devine, had been sentenced to jail and a fine following a guilty…

Continue ReadingInsider Threat – Apple Employee Jailed and Fined
Read more about the article Employee Security – High risk terminations
Employee security: Layoffs are high risk situations.

Employee Security – High risk terminations

  • Post author:Halkyn Security Team
  • Post published:23 October 2014
  • Post category:Security/Security Risk Management

Employee security really does matter. Your employees are the lifeblood of every organisation. You put a lot of effort into hiring new staff, you train them, you nurture them and…

Continue ReadingEmployee Security – High risk terminations

Truecrypt encryption software still available for download

  • Post author:Halkyn Security
  • Post published:1 June 2014
  • Post category:Security/Security News

It seems that Truecrypt is too popular a tool for people to give up on it and version 7.1a is still available for download. A website has sprung up at…

Continue ReadingTruecrypt encryption software still available for download
Read more about the article Truecrypt encryption software ceases production
Without Truecrypt, selecting encryption software is a lot harder.

Truecrypt encryption software ceases production

  • Post author:Halkyn Security
  • Post published:31 May 2014
  • Post category:Security/Security News

On 28 May 2014, the developers of the reasonably infamous encryption software Truecrypt apparently announced that the program was over and that the risk of security weaknesses meant people should…

Continue ReadingTruecrypt encryption software ceases production
Read more about the article Physical security is important for data protection
Physical Security Assessment Form - Free Download

Physical security is important for data protection

  • Post author:Halkyn Security
  • Post published:23 March 2014
  • Post category:Downloads/Security/Security Risk Management

Physical security has always been a cornerstone of any Information Security program. As a topic, it is covered by every major security standard. Most have entire sections dedicated to physical…

Continue ReadingPhysical security is important for data protection
Read more about the article DPA Registration is important if you want to avoid a fine
DPA - follow the law or risk a fine

DPA Registration is important if you want to avoid a fine

  • Post author:Halkyn Security
  • Post published:12 March 2014
  • Post category:Security

Here in the UK, the Data Protection Act (DPA) has been law for 14 years now (the act is dated 1998 and commenced in 2000). Despite this, there are some…

Continue ReadingDPA Registration is important if you want to avoid a fine
Read more about the article Security logs can save your systems and data
Security logs aren't interesting but they are very important.

Security logs can save your systems and data

  • Post author:Halkyn Security
  • Post published:28 February 2014
  • Post category:Security

It goes without saying that security logs are not the most interesting of topics. They are often viewed as a necessary evil, and in some instances they are even minimised…

Continue ReadingSecurity logs can save your systems and data
Read more about the article Data protection needs good physical security
Data protection needs good physical security

Data protection needs good physical security

  • Post author:Taz Wake - Halkyn Security
  • Post published:30 January 2014
  • Post category:Security

Data protection is frequently in the news as organisations more become aware of just how important it is to their business. Unfortunately all too often data protection measures focus on…

Continue ReadingData protection needs good physical security
Read more about the article December DPA Breach Fines
Payday loan companies need to be aware of the DPA and PECR.

December DPA Breach Fines

  • Post author:Taz Wake - Halkyn Security
  • Post published:30 December 2013
  • Post category:Security

The run up to Christmas 2013 has shown that the Information Commissioners Office is still busy fining organisations and individuals for breaches of the Data Protection Act (DPA). In December…

Continue ReadingDecember DPA Breach Fines
Read more about the article Business continuity – 5 things to consider this winter
Snow can disrupt your business.

Business continuity – 5 things to consider this winter

  • Post author:Taz Wake - Halkyn Security
  • Post published:1 November 2013
  • Post category:Security/Security Education and Awareness/Security Risk Management

In the northern hemisphere at least, winter is now upon us and this is time for all business owners to think about how well their business can cope if the…

Continue ReadingBusiness continuity – 5 things to consider this winter
Read more about the article ISO27001 compliance checklist available for download
ISO27001 Checklist tool - screenshot

ISO27001 compliance checklist available for download

  • Post author:Halkyn Security
  • Post published:25 October 2013
  • Post category:Downloads/Security

As mentioned previously, we have now uploaded our ISO 27001 (also known as ISO/IEC 27001:2013) compliance checklist and it is available for free download. Please feel free to grab a…

Continue ReadingISO27001 compliance checklist available for download
Read more about the article Twitter – Possible social engineering attack
Twitter - email headers

Twitter – Possible social engineering attack

  • Post author:Taz Wake - Halkyn Security
  • Post published:15 October 2013
  • Post category:Security/Security News

This evening I managed to end up getting my personal twitter account hijacked and malicious users were able to send out direct messages before I got at least some element…

Continue ReadingTwitter – Possible social engineering attack

ISMS: New version of ISO/IEC 27001 – Time to update?

  • Post author:Halkyn Security
  • Post published:14 October 2013
  • Post category:Security/Security News/Security Risk Management

As you may be aware, the ISO/IEC 27001 standard for Information Security Management Systems (ISMS) was updated and the 2013 version became the "official" version at the start of October…

Continue ReadingISMS: New version of ISO/IEC 27001 – Time to update?
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 10
  • Go to the next page

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Halkyn Security Tags

Anti Terrorism Asset Protection Breach Business Protection Cloud Computing Company News Compliance Crime Cyber Security Cybersecurity Data Protection DFIR Downloads DPA Encryption European Union Data Protection Financial Government Hacking Halkyn Security Consultants Home Security ICO Identity Management Identity Protection Incident Response Information Security Internet Loss Prevention NHS Office Security Passwords Phishing Physical Security PICERL Risk Management Security Security Awareness Training security education and awareness Security Management Security News Security Risk Management Security Services Security Training Truecrypt Vulnerabilities
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Calendar

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Nov    

Halkyn Security Posts

  • DFIR on a Shoestring – Incident response for less
  • Linux DFIR: Workflow for a busy responder
  • Linux Incident Response Guide
  • Incident Response Phases – Lessons Learned
  • Incident Response Phases – Recovery
  • Incident Response Phases – Eradication
  • Incident Response Phases – Containment
  • Incident Response Phases – Identification
  • Incident Response Phases – Preparation
  • Incident Response – Process Matters

Follow Us

  • Twitter
Copyright - OceanWP Theme by OceanWP