fbpx
0

Blog

Avoid paying a King’s ransom for your data

22-Nov-2022

Avoid paying a King’s ransom for your data By John MichaelThe path of digital transformation, accelerated by the unique requirements of the pandemic, has led to untold efficiencies and revolutionary connectivity – but it has also ushered in a new era of threat. More pernicious ransomware puts data at greater risk than ever, and the [...] Read more

Maximising data protection for secure remote working

02-Nov-2022

Maximising data protection for secure remote working By John MichaelThe dynamic of the workplace has shifted. A hybrid or flexible model has become the preferred method of working for millions of employees, with remote capabilities allowing greater freedom to collaborate and innovate outside of the confines of the 9-5 office. Yet, despite its many benefits, [...] Read more

Three critical ways to help financial services protect their data in the cloud

02-Nov-2022

Three critical ways to help financial services protect their data in the cloud By John MichaelAs the digital transformation agenda continues the majority of retail and commercial banks aim to triple their use of cloud services by 2025, according to research1. Cloud-hosted data will enable them to improve agility and take advantage of greater storage [...] Read more

Who is liable for your data in the cloud?

07-Sep-2022

Who is liable for your data in the cloud? By John Michael In an age of ‘cybercrime-as-a service’, cyberattacks, arising from both state-sponsored groups and hacking collectives, are now inflicting unprecedented levels of damage, with the Cisco CEO reporting it now costing USD $6 trillion per year1. According to the Allianz Risk Barometer 20222, cyber [...] Read more

Safer data and how to protect it in a multi-cloud environment

26-Aug-2022

Safer data and how to protect it in a multi-cloud environment By John Michael Multi-cloud has grown considerably in popularity for many businesses due to its ability to increase agility whilst minimising vendor lock-in, improving disaster recovery and boosting application performance, all while streamlining costs. However, data protection issues are of increasing concern. This is [...] Read more

Launch of Lockbit 3.0 ransomware and bug-bounty program

24-Aug-2022

Viewpoint Launch of Lockbit 3.0 ransomware and bug-bounty programRecent news points to a new version of Lockbit ransomware which includes a bug-bounty program. The program offers payment in exchange for information about vulnerabilities in its own code as well as for intelligence about high-profile individuals. With cybercrime constantly on the rise, the emergence of ‘ransomware-as-a-service’ [...] Read more

10 Ways to Compromise your Sensitive Data

13-Dec-2021

10 Ways to Compromise your Sensitive Data In this blog post by Professor John Walker, we will consider the areas surrounding data security and look at the multiples of ways in which it may be breached, altered or compromised. Some may be obvious, others not so. We will explore this topic based on the security four [...] Read more

Understanding and Surviving Ransomware

08-Oct-2021

Understanding & Surviving Ransomware By Professor John Walker Professor John Walker PGCert FRSA CFIP Expert Witness, Digital Forensics & TrainingREAD MOREWhat is ransomware? Ransomware may be defined as: ‘An adverse logical condition with the inbuilt technological objective of compromising a targeted asset(s) to deny the legitimate user(s)/owner(s) access to the contents stored thereon’ There are [...] Read more

Respecting data privacy rights through data encryption

07-Jul-2021

Respecting data privacy rights through data encryption Data rights are human rights. Whilst that principle is embedded within and encouraged by data regulations, including GDPR, DPA, CCPA and HIPAA, it is counteractively provoked by technologies, such as live facial recognition surveillance, that carry the looming risk of abuse and weaponization. Data privacy is often the [...] Read more