Secure IT

>
 
>
avatar

Panama Papers

by Leo Waldock on 13.05.2016 17:46

You're an accountant so no doubt you have searched the Panama Papers database for names or locations of interest, and you may have searched Offshore Leaks.

This super-handy search tool makes it easy peasy to search both databases for person...

avatar

iPhone goes 64-bit

by Leo Waldock on 11.05.2016 14:11

It took Microsoft many years to make the transition to 64-bit software but Apple is doing the job much faster. There was a curiosity 64-bit version of Windows XP in 2002 or 2003 that offered no tangible benefit over 32-bit and now in 2016 we are...

avatar
Yesterday the UK Government released the third FTSE 350 Cyber Governance Health Check report. The report created with the help of the major audit firms aims to improve the understanding and management of cyber risk issues.
avatar

Yesterday the UK Government launched the Cyber Security Breaches Survey 2016, which is endorsed by ICAEW.

avatar

To change or not to change?

by Mark Taylor on 06.05.2016 13:47
Yesterday was World Password Day.  During which I encouraged you to think about pass phrases and possibly change them.
avatar

Encrypted drives

by Leo Waldock on 01.05.2016 17:50

A former Policeman in the USA has been in jail for seven months for refusing to hand over the encryption keys for two of his hard drives. The allegation is that the drives contain child porn and the guy seems guy to prevent law enforcement from ...

avatar

Hacking banks

by Leo Waldock on 01.05.2016 14:41

There are reports that Qatar National Bank has been hacked and has suffered a massive data dump of 1.4GB of data.

That is a LOT of documents.

QNB Group has issued a 'no comment' from Doha.

The size of the apparent security breach is hu...

avatar
Unwanted spam and phishing emails are very common these days. While most go straight into the junk folder some do get through. The NHS email system, one of the largest in the world, rejects around 10 million spam emails a day.
avatar
Recently it has been reported that at least one gang of cyber criminals are using threats to extort money from companies. They are demanding a ransom, via an email, in exchange for not launching an attack on a company website.
avatar

They say you judged in the first twenty seconds of meeting someone new. The same is true on the Internet. Your internet presence allows others to judge the impact you have within your chosen profession.