off

Business Continuity Strategy Planning: The Six Mistakes to Avoid

Any organisation can face significant downtime, data loss and employee displacement if unprepared when a disaster strikes. All of these scenarios can have a serious and detrimental impact on the viability of a business. On that basis, detailed and thorough planning for them can...
Posted On 29 Jan 2020
off

“Lack of basic security diligence around IoT” unearthed by ISE research

In a new follow-up cyber security study of network attached storage (NAS) systems and routers since 2013, consulting and research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 Internet of Things (IoT) devices, reaffirming an industry-wide problem of a...
Posted On 17 Oct 2019
off

Secure IoT 2019 tackles risks and vulnerabilities posed by using connected devices

The potential risks and vulnerabilities posed by using Internet of Things (IoT) systems and connected devices, along with IoT security Best Practice and guidelines, will be up for discussion at Secure IoT 2019. The third annual Secure IoT Cyber Security Conference will be held on...
Posted On 05 Jul 2019
Andrew Buxton
off

Dardan Security appoints former British Army commander Andrew Buxton as head of client services

Security Industry Authority Approved Contractor Dardan Security has appointed former British Army commander of intelligence and surveillance, Major Andrew Buxton, as the company’s new head of client services. With over 30 years’ operational experience within the British...
Posted On 21 Jan 2019
off

“Almost half of companies still unable to detect IoT device breaches” reveals Gemalto study

Gemalto, the digital security specialist, has revealed that only around half (48%) of businesses can detect whether or not any of their Internet of Things (IoT) devices suffers a breach. This news comes despite companies having an increased focus on IoT security. Spending on...
Posted On 15 Jan 2019
Jon Roadnight
off

Drones: Why Is The Security Threat Posed Not Being Taken Seriously?

The threat horizon within the context of security risk management continually evolves, writes Jon Roadnight. Threats emerge largely in response to the identification of vulnerabilities. Those vulnerabilities are either perceived or real, but without a vulnerability or weakness,...
Posted On 26 Nov 2018
Phillip Wood MBE
off

The Inherent Dangers of Seduction

The swift pace of life today coupled with the overriding requirement in the business world to remain in constant contact might open us up to being targeted by those who would steal our identities, money or other highly valued possessions. Phillip Wood outlines why, on occasion,...
Posted On 15 Apr 2016
Phillip Wood MBE
off

Risks, Luck, Variables… and You

When it comes to planning, the translation of thoughts into realities is normally far more involved than simply writing them down and asking someone to make them happen. Of course, our own human judgements influence how things will be done. Phillip Wood examines the role of...
Posted On 10 Feb 2016