The fundamental concept behind safe-t’s services is “Zero Trust”.Continue Reading
As many as three million people use browser extensions that maliciously take their data.Continue Reading
People don’t see why they need a password manager to store a few passwords for all their accounts nor know the risks associated with poor password hygiene. Clearly, there is a need for effective education if more people are to adopt these tools.Continue Reading
There are three key points to making an opportunity “good”:
1. Your prospective clients need what you can provide.
2. Your prospective clients can afford what you can provide.
3. The service / product is something that you can provide competitively whilst making money.
It would seem that cyber criminals are rather opportunistic by nature and have seen the chaos that the pandemic has left in its wake as a chance to get a better return upon their “investments”, and have expanded operations and increased their efforts accordingly.Continue Reading
Angus Shaw In March 2018 Travelex managed to leak around 17,000 people’s data. These unfortunate data subjects were all Tesco Bank customers; the data leaked...Continue Reading
Mustafa Kasim of Palmer’s Green recently became the first person to be sent to prison following an investigation by the Information Commissioner’s Office (ICO). Kasim...Continue Reading
As you have probably seen recently, Heathrow Airport recently had a data breach in the form of a USB stick that had been lost somewhere...Continue Reading
For those of you who know me, whether in a business environment or in a personal capacity, you will know that I am very passionate...Continue Reading
We have all heard the phrase “the security landscape is always changing”, yet so many of us still believe that technology alone can protect our...Continue Reading
We all know that there exists some kind of computer thing that we don’t want called ransomware. We also know that there is a complicated...Continue Reading
Did you know that UK companies must have a disaster recovery plan under GDPR legislation which comes into force on 25th May?
In the dry, legal jargon used in the text of the Data Protection Bill (the UK’s enactment of GDPR): “…the controller or the processor must,...Continue Reading
Why training is needed: Training is key to GDPR as if your staff doesn’t know and understand how to work in a compliant way, then...Continue Reading
2016, early last year, was declared the ‘year of ransomware’. At the time, it saw the largest growth in ransomware attacks the world had ever...Continue Reading
Brigantia has always ensured that we are supplying our partners with the highest level of cyber protection possible and this has led to the development...Continue Reading