Cymraeg

Blog

Latest Posts

News

What does a cyber security strategy look like?

One of the ways I keep up with what is new and current thinking in the cyber security world when I am on the road is by listening to the “Through the Security Rabbit Hole” podcast. As I was listening to one of the recent...

4 December 2015

News

Finding information to help my business tackle cybercrime and its threat

The question asked by many a business is ‘Where do I find information about cybercrime and the threat it poses ?’ One good starting point is the CERT, the Government's Computer Emergency Response Team. In its own words it is...

10 November 2015

News

TalkTalk saga: lessons and thoughts

Last weekend, the telecoms giant TalkTalk faced a huge crisis having been hacked by person or people unknown. News of the attack broke swiftly and was followed by a tsunami of interest and concern across social media. At the front of the...

28 October 2015

News

Five notable examples of advanced persistent threat (APT) attacks

Advanced persistent threat attacks can be traced as far back at the 1980s, with notable examples including The Cuckoo’s Egg, which documents the discovery and hunt for a hacker who had broken into Lawrence Berkeley National Laboratory. In...

19 August 2015

News

City Police explain how to spot a bogus business masquerading as respectable

Trendy suits, smart offices and confidence  Every day of the week, educated professionals hand over huge sums of their hard earned cash to people they believe are highly respectable, only to discover at a later date the individual and their...

11 June 2015

News

How to improve your business data security

The Sony hack, the USIS leak, the JP Morgan credit card leaks, the iCloud celebrity photo hacks – these are just a few of the big profile hacks that took place in 2014. If the last year has taught us anything, it’s that businesses will...

21 May 2015

News

What is your business’s greatest cyber threat?

In the past year, cyberattacks have littered our new feeds, displaying the high cost of a corporate hack. To tackle this top-of-mind IT issue we’ve reproduced, with the kind permission of Modis, an infographic explaining your...

26 March 2015

News

Do organisations with poor data protection lack respect for their customers or employees?

Do organisations which enable their customer or employee data to be accessed by unauthorised parties disrespect their customers or employees? I would argue that they do, whether the cause is poor practice, lack of training, ineffective data (or...

21 January 2015

In partnership with