Browsing All Posts filed under »Home Computing«

Apple remains shameless in their wanton ‘Planned Obsolescence’ agenda

July 7, 2017

0

May of those sitting in front of overpriced Apple devices represent a unique audience of the dammed, dammed by their own myopic almost dogmatic passion and pride in a brand. It’s a severe case of Emperors clothes, where Apple once a leader is now a laggard. Apple is now bloated on its own success having […]

Cyber Hygiene is EVERYONES Priority, get with the Program or else.

May 13, 2017

0

So, the world woke up to a weekend of Cyber hurt that is going to rumble on for some time to come, that you can guarantee, as the Wannabe Ransomware attacks ravage the computer systems and networks of negligent owners.  Negligence is not too strong a word in this instance. Under the UK Companies Act […]

EU GDPR Fines Clarified – Cutting through the ‘FUD’

April 14, 2017

0

The blogspace is a flood with fear, uncertainty and doubt (FUD) tactics pumping up the pending European General Data Protection Regulations (GDPR). The headline grabber and favourite being the €20m or 4% fines applied to global turnover (NOT profit) for infringement. This level of fine is somewhat eye watering taken raw. However, ensure you take […]

Technology Companies, the secret source in the Hackers Armory

April 3, 2017

0

It comes as no surprise to read of an ‘Advanced Chinese hacking campaign infiltrates IT service providers across the globe’ following the announcement a few days earlier from the UK National Cyber Security Centre  ‘Global targeting of enterprises via managed service providers’. Whilst the UK National Cyber Security Centre confidently states ‘We have no evidence […]

Cyber Breach Responsibility

February 10, 2017

0

So, you have woken up to the reality that it is only a matter of time before your organisation will have to handle a Cyber Breach event and asking who should be responsible? According to a Deloitte’s Cyber Risk report only 27% of the UK’s largest businesses can put their hands up to having a […]

EU GDPR mandates the Risk Impact Assessment the new norm for all organisations

January 30, 2017

0

Although security of personal data has always been a legal obligation for organisations, with the new EU GDPR (General data Protection Regulations) coming into force on the 25th May 2018, it reinforces the legal obligations both in substance and context on the data controllers, extending at the same time responsibility directly to data processors while […]

Cyber Hygiene – A modern dilemma

September 22, 2016

1

The faster we move the sicker we get. As we see in our offline world so we are experiencing in our new Cyber realms and digital hyper-connected social network societies. I postulate that IoT (Internet of Things) is as virulent and as terminal as HIV in our digital lives. IoT = D-HIV variant IoT, is a technology […]

Protecting Client Engagements from Cyber Threats

April 11, 2016

0

Leading on from my last post, so what should Law Firms or any professional service organisation for that matter such as financial advisor, accountant or bank, be doing now they are finding themselves under the Cyber Security microscope following the ‘Panama Papers’ expose? With no exceptions senior partners and key stakeholders should be demanding clear […]

Gulf Enterprise Mobility Conference 2016 Insights

April 3, 2016

0

The original intention was to do two full reports from my perspective of Chairman this year for the Gulf Information Security Exhibition & Conference (GISEC 2016) and the Gulf Enterprise Mobility Exhibition & Conference (GEMEC 2016), so it will come as no surprise to anyone active in these spaces to hear that the Enterprise Mobility […]

Caveat Emptor Internet of Things (IoT)

November 6, 2015

0

Further on the IoT (Internet of Things) theme I first wrote about back in June – ‘Internet of Things’ (IoT), Convenience or Calamity?’ ‘FBI Issues Alert on the Security of Internet of Things (IoT) Devices’. Welcomed news until you move past the headline. The guidance that unfolds recommends that responsibility for security should rest with […]