Understanding & Surviving Ransomware By Professor John Walker Professor John Walker PGCert FRSA CFIP Expert Witness, Digital Forensics & TrainingREAD MOREWhat is ransomware? Ransomware may be defined as: ‘An adverse logical condition with the inbuilt technological objective of compromising a targeted asset(s) to deny the legitimate user(s)/owner(s) access to the contents stored thereon’ There are [...] Read more
Respecting data privacy rights through data encryption
Respecting data privacy rights through data encryption Data rights are human rights. Whilst that principle is embedded within and encouraged by data regulations, including GDPR, DPA, CCPA and HIPAA, it is counteractively provoked by technologies, such as live facial recognition surveillance, that carry the looming risk of abuse and weaponization. Data privacy is often the [...] Read more
datAshur helps Kettering Borough Council meet GDPR regulations.
iStorage helps Kettering Borough Council meet GDPR regulations Case Study: Kettering Borough CouncilEnsuring GDPR compliance with datAshur flash drives from iStorage To effectively provide services to local businesses and residents, Kettering Borough Council need to collect sensitive and confidential personal data. Collecting such data can place local authorities in a vulnerable position, as GDPR regulations [...] Read more
Hybrid Working: 5 Tips to Protect your Data.
5 Tips for protecting your data when hybrid working As the last year has unfolded, the working dynamic has distinctly shifted to a new landscape. With Accenture reporting that 83% of 9,326 workers surveyed saying they prefer a hybrid model; hybrid working is set to become the newfound way of living for millions of employees [...] Read more
Encryption: An introductory guide on why it matters
An introduction to encryption Encryption is often a subject that we see thrown around within the media, but for a lot of us it still may not be a term that we fully understand. Whilst it can be a complicated issue, with the right information and tools we can all implement a basic level of [...] Read more
GDPR Three Years On: What is next for the regulation
GDPR Three Years On: How can the European Commission support SMEs to reach an impeccable level of data protection compliance? Who doesn’t remember the implementation of GDPR? It’s hard to believe that it was just three years since GDPR was introduced in the EU. Today, we’re taking a look back to understand just how GDPR [...] Read more
Backdoor Access: Could cybercriminals be secretly accessing your data?
Could cybercriminals be secretly gate crashing your data? No one is keen to host an unwanted guest, but what if you are unaware that they are even there? Trusted global leader in encrypted hardware data storage solutions – iStorage Limited, dissect the idea of backdoor access and how this could affect your personal data. Imagine [...] Read more
Mitigating cyber risks around cryptocurrency
Hackers stole 523 million NEM (valued to £385 Million) from the Japanese cryptocurrency exchange – Coinbase in 2018. NEM Foundation president Lon Wong described it as “the biggest single theft in the history of the world.”