-
When lack of risk assessment means less money
Over the course of several months, and during our discussions with various board members, ‘cyber security’ is often compared to an insurance policy, in that it is a requirement… Read more
-
Cyber espionage – top of the list – defence in depth as response
The latest research from Trend Micro Incorporated, reveals that 20% of global organisations rank cyber espionage as the most serious threat to their business, with a quarter… Read more
-
GDPR – brief overview of requirements
Europe’s General Data Protection Regulation (GDPR) will come into effect on May 25th 2018, necessitating all organisations that process data of EU residents with less than 12 months to meet the… Read more
-
Prepare for cyber threats
A serious security incident is a question of “when,” not “if.” In 2016 and 2017 we have seen number of spectacular news about cybersecurity incidents. We have seen a very… Read more
-
How to secure passwords – why multi-factor authentication?
Why passwords are every company’s one of the biggest risks? Personal passwords should be a concern for a security manager in every company. Managers need to prepare Identity management policies,… Read more
-
Know your enemy – lessons from IDS portal
Majority of cyber attacks come from China – our threat hunting systems are showing that more than 80% detected malicious traffic come from this direction Read more
-
9% of users phished in less than 3 hours. Is phishing all about human behaviour?
Phishing exploit human nature by tricking unsuspected users to click a link and enter some data – usually their username and passwords into something looking innocent – we all know… Read more
-
GDPR – an alternative approach
Can we approach GDPR in the easy to understand way – possibly. Implementation of privacy regulation GDPR explain in the simplest possible way – we can help with aspects which… Read more
-
The biggest threat to cybersecurity
Reflecting on some recent cyber security incidents, I thought it of benefit to write a very simple guide on how to ‘stay safe’ – back to the basics, i.e. no… Read more
-
Cyber risk landscape is changing
Advanced Persistent Threat – ATP – enforce changes to the approach to cybersecurity – we can help with transformation. Read more
-
How we help SaaS vendors
As an SaaS vendor, the core of your operation is to provide your customers with a Web service you have developed. We have worked with a number of SaaS Vendors… Read more
-
Importance of awareness
A serious security incident is a question of “when”, not “if”. In 2016 we have seen a number of remarkable news bulletins about cybersecurity incidents. For example, recently we saw… Read more
-
Is firewall and antivirus enough?
Years ago the security of IT systems was focused on antivirus and firewalls. However, it is important to understand that antivirus was only able to detect and analyse processes which… Read more
-
GDPR – key points
GDPR, or the General Data Protection Regulation is on the top of mind of many managers in business community. The GDPR is due to come into force in 2018 and… Read more
-
Risk in code reuse
We all have to become more efficient in everything what we do or get extinct like dinosaurs – except that in our case we will be replaced by more efficient… Read more
Welcome to my blog!
I’m Amy, a minimalist and simple living enthusiast who has dedicated her life to living with less and finding joy in the simple things. Through this blog, I aim to share my expertise, insights, and experiences. Join me on this journey as we explore the world of slow, purposeful living together!
Find us on:
Join the fun!
Stay updated with our latest recipes and other news by joining our newsletter.
You must be logged in to post a comment.