Cyber SecurityGDPR & Data PrivacyConsultancy ServicesIdentity Protection

Cyber Security

It only takes one data breach to cause significant, long-term damage to your business’ reputation. In recent years Cyber Security has become one of the most important parts of successful IT strategies and traditional firewalls only protect against the most basic of threats.

Read More

GDPR & Data Privacy

On the 25th May 2018 the new General Data Protection Regulations (GDPR) came in to force and there still is a fair amount of confusion about just what exactly must be done to become compliant. Additionally, in the UK the Data Protection Act 2018 will be published and will run in parallel with GDPR.

Read More

Consultancy Services

In excess of 30 years experience consulting in Cyber Security, Identity Protection, IT Consultancy and Data Networking; providing solutions for a wide range of clients from small businesses through to large multi-national organisations and local government.

Read More

Identity Protection

Identity Protection affects both businesses and individuals. Cases include identity theft and fraud through to dealing with hate crime and tracking down online trolls or stalkers. High profile individuals such as celebrities, journalists and company directors need to protect their identities and reputation, perhaps even more so than most businesses.

Read More

Cyber Security

Cyber Security

It only takes one data breach to cause significant, long-term damage to the reputation of your business. In recent years Cyber Security has become one of the most important parts of successful IT strategies.

Cyber Security is also an implied necessity of GDPR, the NCSC say “The GDPR requires that personal data must be processed securely using appropriate technical and organisational measures. The Regulation does not mandate a specific set of cyber security measures but rather expects you to take ‘appropriate’ action. In other words you need to manage risk. What is appropriate for you will depend upon your circumstances as well as the data you are processing and therefore the risks posed, however there is an expectation you have minimal, established security measures in place. The security measures must be designed into your systems at the outset (referred to as Privacy by Design) and maintained effective throughout the life of your system.” ref: https://www.ncsc.gov.uk/GDPR

Your data needs to be protected against more than just external hackers and internal security risks. Don’t forget that badly configured systems can leak data and that malware can steal or encrypt data – both are significant threats nowadays. One of the most common methods seen is the phishing of user credentials, especially of those with administrator rights.

Data needs to be encrypted both on hard drives (known as Data At Rest) and whilst being transmitted across a network (known as Data In Transit). For a small business this can often be easily achieved fairly easily with a few changes, whereas a large multi-national organisation could face quite a complex challenge, possibly even requiring dedicated hardware solutions.

Traditional firewalls alone cannot protect your data. Todays next generation of firewalls are known as Unified Threat Management (UTM) security appliances, they also provide intrusion detection, anti-malware, anti-spam, content filtering and VPN capabilities in one integrated package.

Larger organisations should invest in a SIEM (Security Information Event Management) platform. A SIEM collects event logs from your servers, network hardware and security appliances and will automatically identify and alert you to hacking attempts, breaches, user account issues, malware and other types of security incidents.

Whether a small business or large corporation, we can review your current security infrastructure and make recommendations and changes to improve the protection it provides or, if necessary, we can design you a newer, up to date replacement.