Welcome to the surveillance state
Current approach sends the wrong message to our citizens and the worldIt is critical the UK gets its cybersecurity legislation right, because so much depends on our digital presence today….
When you are held to ransom, it’s better to have backed up than have to pay up
A low-cost solution is available to avoid a devastating loss of business dataIt’s the middle of the afternoon. The day is going well. Business is good. Then you notice something…
Where maximum security is taken to a whole new level
Scotland’s first purpose- built data centre sets new standards for safety and efficiency Chapelhall, near Airdrie, is not the first place you might think to retreat to in the event…
Huge demand for security conference
Business leaders and technologists gathered for an industry-leading cybersecurity event in Edinburgh.Organisers closed registration three weeks early as demand for places soared at Scot Secure 2016, held at Our Dynamic…
Check if your password has been ‘pwned’
We all live in very real fear of our private data being hacked. But fear not, there is now an online resource where you can check to see if any…
‘Spearphishing, smishing and whaling’ – we’re struggling to keep up, admits cyber cop
Police Scotland hope for co-operation between officers and business as it fights against a rising tide of automated and industrial hacking New and constantly evolving forms of cybercrime have left…
‘If information about your business is for sale on the dark web you really ought to know’
What is a cyber threat? It’s a simple enough question with a hundred different answers reported daily with increasing sensationalism by the media. Where does it come from? Is it…
Unmasked: Where the real danger to company security lurks
Cyber attacks might originate with a reclusive teenager in a white mask, but if organisations want tobe safe from them they should focus not on their IT department but on…
A hacker’s step-by-step guide to how you can beat the hackers
The six cyber security steps to protect your business from harm: from an ‘ethical hacker’ whose Facebook password is 125-characters long How do you best protect your enterprise from cyber-attack,…
Balancing the right to privacy with the duty to protect
A hack of Firefox and Google Chrome underlines the complexity of the encryption debateThere are few things nicer than presenting some ideas in my home city, Edinburgh, a place that…