What can cybercriminals do with personal information?

Data breaches regularly make the news, with reports of enterprises admitting that personal information has been leaked in hacker attacks. While most people are aware that data regulators require companies to safeguard this sensitive information, not all are aware of just what happens to it after it is stolen by hackers. Each year, billions of […]

Read More… from What can cybercriminals do with personal information?

Five tips for improving business cybersecurity

Growing threats from cybercriminal groups in 2020 have resulted in a wide selection of operations being attacked. From headline-making hits on international corporations with top-grade security to the lesser prepared medium-sized businesses and smaller healthcare facilities who lack a dedicated IT security team, all enterprises and organisations are potential targets for […]

Read More… from Five tips for improving business cybersecurity

How to prepare a data breach incident report

If an organisation or institution in the UK incurs a data breach where personal or private information is disclosed without authorisation or is destroyed unlawfully, it will have 72 hours to inform the Information Commissioner’s Office (ICO) of the event. Specific details, including dates, figures and facts, will be required, and those charged with data […]

Read More… from How to prepare a data breach incident report

Four kinds of data breach and how they impact enterprises

Data breaches can cause companies both time and money. While breaches are inspected and systems restored, valuable time can be lost due to the disruption. The financial effects can be even more problematic, with not only expensive forensic investigations and new security solutions to contend with, but costly legal battles with data subjects and fines […]

Read More… from Four kinds of data breach and how they impact enterprises

Nine important GDPR requirements for UK enterprises

The General Data Protection Regulation (GDPR) was established to provide rules for companies to adhere to when managing and storing personal data. GDPR states the responsibility of firms to protect and ensure the privacy of individuals they retain data on, while giving rights to these individuals and assigning powers to […]

Read More… from Nine important GDPR requirements for UK enterprises

How easy is it to spoof an email address?

Firstly, let’s get something straight. This isn’t a blog that will tell you how to spoof an email address. So, if that’s the information you’re looking for, then you won’t find it here. However, if you’re interested to know more about what, exactly, email spoofing is – and how you can defend yourself against it […]

Read More… from How easy is it to spoof an email address?