Whitepaper: EU General Data Protection Regulation, a new era in data protection

The European Union General Data Protection Regulation applies to information which directly or indirectly identifies an individual, including customer lists, contact details, genetic/biometric data, and online identifiers like IP addresses. Aon discusses complex data ownership models that could become pitfalls for companies to be non-compliant under the incoming regulation. View the full white paper from Aon, the insurance […]

Peering into Pandora’s Box Brexit and the implications for IT decision-makers

4D Data Centres have conducted a report to explore Brexit’s impact on business IT strategies. In the Autumn of 2016 they surveyed 200 UK decision-makers in small-to-medium sized businesses. They told us decision-making has become a lot tougher post-Brexit. A state of paralysis is curtailing their ability to make confident choices. 71% say the government has […]

Why communication is vital during a cyber-attack

Cyber-attacks are a constant threat to organisations. Cloud-based communications platforms can help an organisation improve emergency communications and recover from the effects of a cyber-attack. In today’s globalised business environment, organisations of all sizes face the prospect of falling victim to a cyber-attack or IT outage that could cause serious damage to its infrastructure and […]

Fight fraud in telecommunications

Mobile network operators have long been targets for fraud and revenue risk.  The nature of these companies’ businesses – providing huge volumes of communications services to vast numbers of people – mean these companies generate significant revenues.  Wherever revenues are large, risk of fraud will be too. Mobile service providers generate revenues in two ways.  […]

Protecting your organisation from itself: The threat from within and how to mitigate it

In February of this year security researchers proved that with a simple USB drop in a hospital it was possible to hack patient records, critical medical equipment and patient monitors. Vital signs could be manipulated, drug doses changed and medical equipment operated remotely. You can find the full whitepaper here by Bryan Lillie, QinetiQ’s Chief Technology Officer.

Is your CCTV system safe from cyber attack?

This whitepaper provides insight into CCTV systems and cyber attacks from serial entrepreneur, James Wickes. James has 30 years’ experience in IT and is the CEO and co-founder, Cloudview. Across society, visual surveillance plays a vital role in the protection of people, property and assets. But traditional DVR-based CCTV systems leave companies vulnerable to attack […]