+44 (0) 333 150 6660
UK nurse using computer tablet

Thousands of Welsh NHS employees have had their personal data stolen. The data is processed by a private contractor, Landauer, who’s system has been hacked. The breach is said to have transpired in October last year however, those staff affected have only been informed this month- March 2017. Darren Millar, politician for the Clywd West …

Read more
Image 1

Customer Success: Bradford MDC The City of Bradford Metropolitan District Council (MDC) has selected Galaxkey to enhance their data protection and replace their incumbent encryption solution. Bradford MDC is a public sector organisation responsible for numerous services that benefit residents of the Bradford District within the United Kingdom. Bradford realised that their existing solution needed …

Read more
Security concept: computer keyboard with word Email Security on enter button background, 3d render

President Barack Obama will soon be succeeded by President Elect Mr Donald Trump. One of the many glaring contrasts existing between the two American leaders is their differences in opinion regarding technology and how and when it should be used. Mr Obama has supported the use of technology, within his government, during his presidency. He …

Read more
Security concept: computer keyboard with word Email Security on enter button background, 3d render

We have such a misguided perspective of email and email function. We send emails, expecting them to be instantaneous-to arrive with immediate effect. Many of us have experienced email behaving in this way and because of this we know no different. This is not how email was designed to function. Looking back, over a decade, …

Read more
Legislation word cloud concept

Here are some insights …   Only 6% of cloud services currently comply with incoming data protection laws, a survey has found. The overwhelming majority of 20,000 cloud services evaluated by cloud security firm Skyhigh Networks do not meet the stricter requirements to protect data set out under the EU’s General Data Protection Regulation (GDPR).[1] …

Read more
Privacy concept: pixelated words Data Encryption on digital background, 3d render

28% of organisations using public cloud are not encrypting data stored there, according to a survey released by the US IT company HyTrust.[1] The cloud adoption survey interviewed more than 400 executives across different industries attending the VMworld conference, a global cloud computing conference. The most staggering finding was that while 46% listed their greatest …

Read more
Computer hacker silhouette of hooded man with binary data and network security terms

What could be the largest publicly disclosed cyber-breach in history was exposed last week, as Yahoo revealed ‘state’ hackers stole data from 500 million users.[1] This included swathes of personal information, including names and emails, as well as ‘unencrypted security questions and answers,’. While the hack took place in 2014, it has only now been …

Read more
Information concept: pixelated words data collection on digital background, 3d render

In August, the Anderson Review into bulk data collection – initiated by Teresa May as Home Secretary – published its findings. Britain’s spies should be allowed to continue harvesting large amounts of data from emails. David Anderson also backed the hacking of phones and computers ‘in principle.’ The government’s Investigatory Powers Bill, will put these …

Read more
Computer hacker silhouette of hooded man with binary data and network security terms

Sports stars are rarely targets for alleged state-sponsored hacking. However, the condemnation piled upon Russia in advance of this year’s Olympic Games should have prompted the World Anti-Doping Agency (Wada) to assess its cyber security. Retribution was possible; a cyber attack the most likely means. The theft of medical data belonging to Chris Froome, Bradley …

Read more
APPROVED rubber stamp

Earlier this month, Hillary Clinton’s campaign team announced that they have adopted end-to-end encryption. Following controversies surrounding Clinton’s use of personal email while in office, coupled with the revelation last month that the Democratic National Committee had been hacked by a Russian group, a very public demonstration of data security was essential. Clinton’s endorsement of encryption, …

Read more
Page 1 of 3 123