Unsafe Financial Transactions

Despite continuous reports of financial fraud in the media, history appears to keep repeating itself. The same frauds are still being carried out, and the only real difference, is an increase in the level of fraud, not a decrease due to increased awareness. Earlier this month I published an article called ‘deviation from the norm’ […]

Read more

More on passwords

The strange thing about writing a password blog, is that most of it is the same as what was being discussed 20 years ago, so the challenge is not writing about passwords, but in fact making the subject of passwords interesting to read. The key difference is that during these 20 years the use of […]

Read more

Bring Your Own Devices

Should employees be allowed to bring their own devices into the work place and connect them to the corporate network? There are mixed views on this, and the key point is to carefully consider the advantages and disadvantages, and then define corporate policy. Personal devices in the workplace are a high risk and the IT […]

Read more

.EU domains after Brexit

In March 2018 the European Commission announced that upon the United Kingdom’s departure from the European Union, businesses and individuals in the United Kingdom will no longer be entitled to register .EU domains or renew existing .EU domains. More information is available here: https://ec.europa.eu/digital-single-market/en/news/notice-stakeholders-withdrawal-united-kingdom-and-eu-rules-eu-domain-names A number of workarounds have been identified and advertised such as […]

Read more

The paper data breach

In the digital age, much emphasis is placed on protecting electronic data, but very little seems to have changed in the way of protecting data on paper. Here are a few examples: Charity – I am often approached on the street by a representative of a charity wanting monthly donations by direct debit. While listening […]

Read more

Unwise Software Installations

The issue of viruses, ransomware, spyware and other forms of malware intended to cause harm, has become much more of a hot topic in recent years. However, this has not translated into a comparable increase in vigilance and due diligence when it comes to choosing software vendors and websites. Although many attacks come from vulnerabilities […]

Read more

Copycat Services

Copycat services are being offered in place of official services provided by government departments and local authorities, but with a difference: the copycat service is more expensive, not always completely legal, and seldom offers any added value above and beyond the official services available. These types of Copycat Services are different to services delivered through […]

Read more