Skip to content
Halkyn Security Blog
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us
Menu Close
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us

Specialist Security & Risk Management Consultants

Hospital loses 800 patient’s data

  • Post author:Halkyn Security
  • Post published:3 October 2011
  • Post category:Security News

A report has apparently revealed that the East Surrey Hospital has lost an unencrypted USB drive containing the details of 800 patients. According to the Crawley Observer, this data included details such…

Continue ReadingHospital loses 800 patient’s data

Employee Owned Devices

  • Post author:Halkyn Security
  • Post published:30 September 2011
  • Post category:Security/Security Risk Management

It is difficult for any enterprise level IT hardware supply to keep up with the trend for new, shiny, consumer devices. Most businesses have a multi-year cycle of purchasing assets,…

Continue ReadingEmployee Owned Devices

Business Security – Rapid Security and Safety Review Checklist

  • Post author:Halkyn Security
  • Post published:26 September 2011
  • Post category:Downloads/Security/Security News

It is important that you understand what your current security situation is. This is the bedrock for everything else you do, however, unfortunately most organisations seem to have difficulty pinning…

Continue ReadingBusiness Security – Rapid Security and Safety Review Checklist

Hacked out of business?

  • Post author:Halkyn Security
  • Post published:23 September 2011
  • Post category:Security/Security News

Most businesses understand that security is important but, as we discussed in a previous post (How do you measure the value of Information Security?) there is a tendency for owners…

Continue ReadingHacked out of business?

Security Investigations, an essential tool

  • Post author:Halkyn Security
  • Post published:19 September 2011
  • Post category:Security

Security always fails at some point. No matter what you do, the bad guys will eventually manage to get past something. Sadly, this is inevitable. The best employee screening program…

Continue ReadingSecurity Investigations, an essential tool

Prison Sentences for Data Breaches?

  • Post author:Halkyn Security
  • Post published:16 September 2011
  • Post category:Security

A recent study by CA Technologies indicates that almost 90% of businesses experience some form of data loss (as reported in SC Magazine) and 2009 research from the Ponemon Institute…

Continue ReadingPrison Sentences for Data Breaches?

Email Security – the risk of typos

  • Post author:Halkyn Security
  • Post published:12 September 2011
  • Post category:Security/Security News

We all make typos - nearly everyone suffers from the effects of fingers and brains going out of sync - and it is why the most important tool in any…

Continue ReadingEmail Security – the risk of typos

How do you measure the value of security?

  • Post author:Halkyn Security
  • Post published:9 September 2011
  • Post category:Security/Security Education and Awareness/Security Risk Management

For lots of people and businesses of all sizes, security is viewed as something which is an unfortunate cost that simply has to be tolerated. In effect, this gives rise…

Continue ReadingHow do you measure the value of security?

Risk Management and Measurement

  • Post author:Halkyn Security
  • Post published:7 September 2011
  • Post category:Security/Security Risk Management

Security is built upon the bedrock of risk management, but this is frequently overlooked and instead things are left to chance. Every activity carries risk and nothing can ever provide…

Continue ReadingRisk Management and Measurement

Security Policy – Essential first step

  • Post author:Halkyn Security
  • Post published:5 September 2011
  • Post category:Security/Security Education and Awareness

Security is important. Security underpins pretty much every activity you are engaged in - be it at work or at home. From a business perspective, security can be the difference…

Continue ReadingSecurity Policy – Essential first step

Global Marketplace – Staying Secure Abroad

  • Post author:Taz Wake - Halkyn Security
  • Post published:2 September 2011
  • Post category:Security

There is a strong business benefit in being able to project you business across the globe. By lifting geographical boundaries, you open up new markets and can take advantage of…

Continue ReadingGlobal Marketplace – Staying Secure Abroad

Testing for Insecure Passwords

  • Post author:Halkyn Security
  • Post published:26 August 2011
  • Post category:Security/Security Education and Awareness

Despite recent popular opinion and some well publicised hacks involving them, passwords are not intrinsically weak. When used properly, they are a perfectly good, single factor, method of authentication. The important part…

Continue ReadingTesting for Insecure Passwords

Public Key Encryption with GnuPG

  • Post author:Halkyn Security
  • Post published:22 August 2011
  • Post category:Security/Security Education and Awareness

One of the most overlooked risks of using the internet is the fact that most of the time your data is as private as the writing on the back of…

Continue ReadingPublic Key Encryption with GnuPG

Malicious Spam on the Rise

  • Post author:Halkyn Security
  • Post published:17 August 2011
  • Post category:Security/Security News

Research carried out by two security companies has provided information that most people will have already recognised - in the last week there has been a significant increase in spam…

Continue ReadingMalicious Spam on the Rise

Passwords and IT Security

  • Post author:Halkyn Security
  • Post published:13 August 2011
  • Post category:Downloads/Security/Security Education and Awareness

Passwords are frequently thought of as an "outdated" method of security and numerous product vendors will tell you how they offer a much better solution that kind of works like…

Continue ReadingPasswords and IT Security
  • Go to the previous page
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • Go to the next page

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Halkyn Security Tags

Anti Terrorism Asset Protection Breach Business Protection Cloud Computing Company News Compliance Crime Cyber Security Cybersecurity Data Protection DFIR Downloads DPA Encryption European Union Data Protection Financial Government Hacking Halkyn Security Consultants Home Security ICO Identity Management Identity Protection Incident Response Information Security Internet Loss Prevention NHS Office Security Passwords Phishing Physical Security PICERL Risk Management Security Security Awareness Training security education and awareness Security Management Security News Security Risk Management Security Services Security Training Truecrypt Vulnerabilities
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Calendar

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Nov    

Halkyn Security Posts

  • DFIR on a Shoestring – Incident response for less
  • Linux DFIR: Workflow for a busy responder
  • Linux Incident Response Guide
  • Incident Response Phases – Lessons Learned
  • Incident Response Phases – Recovery
  • Incident Response Phases – Eradication
  • Incident Response Phases – Containment
  • Incident Response Phases – Identification
  • Incident Response Phases – Preparation
  • Incident Response – Process Matters

Follow Us

  • Twitter
Copyright - OceanWP Theme by OceanWP