What is Sensitive Personal Data for GDPR?

The GDPR (General Data Protection Regulation) came into effect on May 25th 2018. It imposes the toughest data privacy and security laws anywhere in the world on any organisation that targets or collects data related to people in the EU.

Personal data is at the core of these stringent regulations.

The Importance of Encryption to Your Business

We hear a lot about the importance of encryption and encrypted data these days. Search engines, for example, encrypt search data to protect users’ information and every time we use our mobile phones, credit cards and carry out online transactions encryption is used to ensure these transactions are safe and secure.

What are Cyber Threats and How to Prevent Cyber Attacks

Cyber threats and cyber security have been hot topics in the news due to reported increases in various forms of cyber attack. Around 68% of business leaders think that their cyber security risks are increasing and 62% of businesses actually experienced phishing and social engineering attacks in 2018. Yet remarkably, on average, only around 5% of companies’ data folders are properly protected.

Life after passwords

How IT security is moving beyond passwords

If any part of your IT security depends on a username and password, it is simply not good enough. It must be considered at risk. To reduce that risk, Multi-Factor Authentication – MFA – could be the solution you need.

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its stance. Find out why and learn what their new recommendations are for creating strong passwords. The problem The issue isn’t that the NIST advised people […]

A closer look at fileless malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic, IT processes, and system administration tasks while leaving fewer footprints. Ultimately, your business could be at […]

Monitoring your employees online: Is it a good idea?

The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]