Category Archives: SME

Pig Food and 10 Steps to Cyber Security

10 Steps to Cyber Security

Below is copy of the GCHQ and Government guidelines for businesses in the UK to protect themselves in Cyber Space. Its useful information and covers a wide range of threats. It is about Cyber so don’t expect chapter and verse on backup or file archiving and, if you are dealing with people and processing personal details, how long you should keep data for or how you should destroy it.

The link below does point to some useful and thoughtful information so please take the time to review it.

Why?

If you sold pig food do you think you would be the target of a cyber attack? Well we know of one business that was cleaned out of a substantial sum of money last week. It could be YOU next.

Further details can be found here https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility

Read more ...

IT Security Concepts

IT Security Concepts

Introduction

This document is an attempt to formulate basic reasoning behind security technologies, we should employ. It is not trying to analyse the actual techniques used and tries to stay away from technology comparisons. I apologize for some of the analogies that may sound infantile. The reason for this is two-fold: it may help to explain the concept to a non-technical reader, but also, I found that using simple analogies may sometimes expose holes in our thinking.

Why use security systems

It is quite obvious that any security system has a cost, not only in terms of cash, but also – more significantly –

Read more ...

Where to keep your sensitive data for remote working

Where to keep sensitive data

The table below summarizes security and speed implication of different ways of accessing sensitive data while working out of office. Note that the comparison only lists most popular ways of storing data and the Security/Speed correspond to typical situation – in the real world access speed and security provided by local encryption vary.

Read more ...

Snooper’s charter – here we go again!

This hydra has plenty of heads. And for each that is cut off, two more grow… http://www.theguardian.com/media-network/2015/may/27/snoopers-charter-business-public-communications-data reports on the next attempt of making this bill stick. There is very little a business can do about the external mail – encryption works for recipients who support it and is a good idea. But businesses should start thinking more carefully about their internal emails – obviously more sensitive. It may be a good time to ensure that the internal emails – including from mobile workers and mobile devices – don’t wonder around Internet where they have to be logged, preserved and disclosed to who knows whom – deliberately or by mistake.

Hotel #Wi-Fi not only hideously expensive! It’s horribly #insecure @richardzybert

The expensive hotel Wi-Fi is shocking. I use @richardzybert software and hardware so I know I will be secure > Wi-Fi not only hideously expensive it’s horribly insecure — http://theregister.co.uk/2015/03/27/hotel_antlabs_inngate_rsync_vulnerability/