+44 (0) 20 3291 3836
Privacy concept: pixelated words Data Encryption on digital background, 3d render

BBC’s technology reporter, Chris Foxx, explains encryption in an easy to understand manner.  Encryption may seem like a difficult concept to get one’s head around and it is great to see that the BBC have put together a video to explain encryption and its enviable uses in a way that is simple for everyone to …

Read more
UK nurse using computer tablet

We often hear or read of one or other NHS trust having undergone a data breach and mostly this leads to loss and compromise of sensitive information as well as a substantial monetary penalty. Scanning through the UKs ICO news, it is not difficult to find evidence of this.  The health trusts have been in …

Read more

A law enforcement team in the Netherlands have revealed that emails sent encrypted on BlackBerry devices can be read on the devices despite the use of the encryption technology, PGP, on BlackBerry devices. A team of forensic investigators from the Netherlands Forensic Institute (NFI), noted that through the use of certain software, a forensic technology, …

Read more
Legislation word cloud concept

Draft Overhaul of Surveillance Bill UK The beginning stages of the drafted changes to the UK Surveillance Bill have begun.  The bill discussions began November 4th regarding a range of aspects of data surveillance, investigatory powers and security of data.  There has been much discussion and mixed opinions surrounding data and the right to privacy …

Read more
timeout

With the latest version of Galaxkey for Windows, you can  send emails to recipients which can be timed out after a preset time. The functionality to set the time is available in the Galaxkey Add-in for Outlook. When you send the email to a recipient, you have the option to set the time until when …

Read more

Criminals are intercepting emails between solicitor and client. Due to many legal firms communicating insecurely with their clients, clients are at increased fraudulent risk. This does not have to be the case. Recently a homebuyer had £330,000 stolen because their email communications with their solicitor were being intercepted and another £299,000 and these are not …

Read more

A recent report by David Kaye, International and Legal Protection and Anonymity, to the United Nations Human Rights Council, highlighted the necessity for encryption and the people’s entitlement to it. Presently talks have been underway amongst many governments with the intentions to enable surveillance of communications, via enforcing the creation of backdoors into encryption solutions, …

Read more

July last year the Data Retention and Investigatory Act, which enables Britain’s intelligent agencies to collect people’s communications data (phone and internet), took only three days to be made official, a process that under different circumstances may take weeks or even months to achieve. The fast-tracked legislation was accomplished within three days, as a quick …

Read more

There has been much talk, debate and speculation, globally, regarding the enforcement and requirement for back door creation for encryption technologies recently. The Vice President, Andrus Ansip, of the European Commission has stated that there are no plans to necessitate back doors in communications encryption in Europe. Reasoning behind this includes, to avoid potential misuse …

Read more

Recent research suggests that impact of data breaches on Enterprises is on the rise and will reach aftermaths in a region of £1.3 trillion, across the globe, by 2019. Cybercrime is becoming more sophisticated and planned, with fewer chance attacks occurring. The utilisation of specifically developed cybercrime products with premeditated purpose in mind is also …

Read more
Page 1 of 7 12345...Last page