How can marketers stay personal in an age of privacy?

With the imminent arrival of the EU General Data Protection Regulation (GDPR), media conversations about the potential implications continue to incite panic among marketers. The relationship between marketing and data has continued to grow alongside digital development, to the point where it is now difficult to imagine maintaining relationships with customers without a heavy reliance […]

Google announces plans to downgrade trust in Symantec certificates after more illegit HTTPS certificates are issued

Google has announced that they are downgrading the level of trust that it has in Symantec certificates following an investigation that revealed ‘a continually increasing scope of misissuance’ by Symantec over a period of several years which has exposed users to significant dangers. Google Chrome developers plan to restrict transport layer security certificates sold by […]

Critical national infrastructure organisations are a target for cyber attacks: steps to understanding your risk exposure

Cybercrime forces companies of all sizes in almost every sector to take stock, but for those organisations that make up our critical national infrastructure, the threat of a cyber attack has serious repercussions that reach far beyond the disruption to the individual business. Yet we all depend on the reliable functioning of our critical infrastructure […]

Protecting your organisation from itself: The threat from within and how to mitigate it

In February of this year security researchers proved that with a simple USB drop in a hospital it was possible to hack patient records, critical medical equipment and patient monitors. Vital signs could be manipulated, drug doses changed and medical equipment operated remotely. You can find the full whitepaper here by Bryan Lillie, QinetiQ’s Chief Technology Officer.

Data Leaks and Cybersecurity

Cybersecurity is very much the topic of the day, with billions invested by the UK government in developing strategies to combat security concerns and regular news stories of attempted incursions into government, business and infrastructure, aimed at disrupting the lives of many. For governments, businesses and even everyday IT users, cybersecurity is the watchword that […]

Cyber threats and attacks: You can’t protect what you don’t know you have

Software Asset Management, or SAM, includes the management and optimisation of software within an organisation. It involves monitoring applications right from purchase, through to deployment, and then removal whilst tracking usage and maintenance. Part of the broader IT Asset Management (ITAM) discipline, SAM data underpins business decisions by assisting all departments with payment structures, contract […]

The Ugly Reality of Ransomware for SMEs

This malicious software will kidnap your data, hold a gun to its head and say: your move. Some attacks go even further and plant incriminating evidence on your computer to prevent the authorities getting involved. Ransomware exists in numerous forms and its methods are constantly evolving. Attackers employ this software to obtain leverage over you […]