GDPR – The need to know!

GDPR – The need to know! Many organisations will be aware of the General Data Protection Regulation (GDPR) and how it will completely change the way personal information is handled by organisations. The regulations will have far-reaching consequences for how organisations acquire, store and use personal data. The date for this new legislation; 25th May […]

Business Continuity – Keeping your Data Safe and Business Trading

Business Continuity – Keeping your Data Safe and Business Trading Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation. What is it? Identity and access management (IAM) is the […]

Taking the “F” out of Authentication

Taking the “F” out of Authentication   Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation.   What is it? Identity and access management (IAM) is the security discipline […]

Breakfast Bytes – Our Line Up of Speakers

Breakfast Bytes – Our Line Up of Speakers The IT security landscape is evolving fast, very fast, and technology is constantly on the pursuit to protect against the latest threats in the world. One of the latest trends is in the modern day is Digital Identity; the online or networked identity adopted or claimed in […]

Breakfast Bytes | Digital Identity: Risk or Opportunity?

Breakfast Bytes | Digital Identity: Risk or Opportunity? Information security remains one of the most critical IT disciplines in the modern day and it’s only becoming more prominent as large-scale breaches of corporate networks continue to shake consumer trust and provoke new regulations. However, the IT security landscape is evolving fast, and Identity and Access Management […]

Square or Round Wheels?

Square or Round Wheels? It all boils down to 1 question, “Are you too busy to improve?” This is a great enabler for the discussion on how to improve. It’s so simple and a great way to start the discussion on any complex matters. I have seen it quoted, shared and commented on many times, […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

Business Continuity – Communicating Effectively Internally In Times Of Disruption It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In […]

8 Top Tips for Keeping Your IT in Great Shape

8 Top Tips for Keeping Your IT in Great Shape In one way or another, Information Technology (IT) is an integral part of any business and we often don’t realise how much we rely on it until it’s non-operational. When such a thing occurs, business day-to-day operations are slowed and can even grind to a […]

Not A Very Merry Christmas – Looking Back to 1987

Not A Very Merry Christmas – Looking Back to 1987 Christmas Tree EXEC was the first widely disruptive computer worm which paralysed several international computer networks in December 1987. Christmas Tree EXEC was an early mass mailing worm coded by an unnamed student from Clausthal University of Technology. This was the first widely disruptive computer worm which […]

THE FRENCH CONNECTION – LOOKING BACK TO 1987

THE FRENCH CONNECTION – LOOKING BACK TO 1987 The Channel Tunnel Act 1987 authorised the construction of the Channel Tunnel that connects the UK with France, via an underground train tunnel. The idea of a tunnel was first proposed in 1802 but construction wasn’t started until 1987/88. Construction of the tunnel was completed in 1993 […]

TENGEN | GAME OVER! – LOOKING BACK TO 1987

TENGEN | GAME OVER! – LOOKING BACK TO 1987 Atari Games was formed from Atari’s arcade division. They could use the Atari name on arcade releases, but not on console or computer games. When Atari Games wanted to enter the console-game market, it needed a new label that did not use the Atari name. Enter TENGEN! Going […]

EXCELLING AT AGEING – LOOKING BACK TO 1987

EXCELLING AT AGEING – LOOKING BACK TO 1987 Everyone is bound to have used Microsoft Excel at some stage in their professional career, but for those who are lucky enough to have dodged spreadsheets until now, Excel is a spreadsheet developed by Microsoft for Windows, MacOS, iOS and Android. Microsoft Excel is one of the […]

WHATEVER HAPPENED DAT?- LOOKING BACK TO 1987

WHATEVER HAPPENED DAT?- LOOKING BACK TO 1987 Digital Audio Tape, what was it? What was it used for? Who used it? OK Let’s refresh the memory… DAT or Digital Audio Tape for short, was a signal recording and playback medium developed by Sony and introduced in 1987.  The recording was in digital rather than analog and used […]

EVERY LITTLE HELPS- LOOKING BACK TO 1987

GOING TRULY GLOBAL – LOOKING BACK TO 1987 “Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From […]

GOING TRULY GLOBAL – LOOKING BACK TO 1987

GOING TRULY GLOBAL – LOOKING BACK TO 1987 Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From […]

A Helping Hand – Looking Back to 1987

A Helping Hand – Looking Back to 1987   ISO 9000… what began in 1987 has evolved over the years making it one of the most used management tools worldwide. The standard aims to help organisations satisfy their customers by meeting regulatory requirements and fostering continuous improvement. Although not a complete guarantee of quality, the […]

Data-Security

Bill Of Rights – Looking Back to 1987

Bill Of Rights – Looking Back to 1987   The Constitution of the Republic of the Philippines was ratified by a nationwide plebiscite on February 2nd 1987, Section 1 of Article III of the Bill of Rights states the following… “No person shall be deprived of life, liberty or property without due process of law, nor […]

Data Security Mobility

The Nokia Cityman 1320 – Looking Back to 1987

The Nokia Cityman 1320 – Looking Back to 1987 The Nokia Cityman 1320 was launched in 1987 as Nokia’s first portable phone. At €2,258 for a device, you were the cool kid on the block of you owned one these! Back then, 50 minutes talk and 4 hours charging time was viewed as a luxury, even […]

Apple.com Looking back to 1987

Apple.com – Looking Back to 1987 The domain apple.com went online 30 years ago on 19th February 1987. Registered for free, the web has fostered Apple’s growth and revenues of over 200 billion Euro. We can see just how much Apple ‘the brand’ has changed dramatically over the past 20 years. The colourful rainbow logo […]

Cyber Expo Ireland – A Thriving Success

Cyber Expo Ireland – A Thriving Success The Irish Management Institute (IMI), Dublin was the setting on Wednesday 29th November, for Ireland’s 1st Cyber Data and Compliance Expo – Cyber Expo Ireland. With over 600 attending on the day, the delegates were welcomed into what can only be described as a practical but serious demonstration […]

Hang On! Business Continuity and the Retail Sector

Hang on! Business Continuity – The Retail Perspective  “Business as usual” is the goal for every business continuity plan. Retailers come in many forms including supermarkets, department stores and clothing outlets but they also come in many sizes from your large multinational corporations (MNCs) such as Tesco right down to your SMEs such as your local […]

Trusted Partners – Trust is Key

Trusted Partners – Trust is Key Trust is a fundamental principle of our business. We all know how to measure the value of tangibles such as equipment, stock, people and other resources, but what about the intangibles? Trust is difficult to measure due to its intangible nature because it has different value at different levels, for […]

Smartphones- The Love, Hate Relationship

Smartphones- Swipe Left or Right? We all do it. Smartphones, we all take them for granted these days. They have slotted in to our daily lives seamlessly both at home and work. It’s like they are a third arm! We love our smartphones, as we literally have our entire lives in our hands…Our work emails/personal/, […]

Defending Against Ransomware

Defend Against Ransomware Ransomware is constantly on the rise, attacking organisations large, small and everything in between, including the NHS which was hit by a ransomware attack in May 2017. Thus, it’s clear that no business is safe from the threat of ransomware attacks and that is why it will be a key theme at […]

Manufacturing and business continuity

Business Continuity – A Manufacturing Perspective Coming from the perspective of the manufacturing industry, business continuity is about ensuring products continue to reach customers, regardless of any internal problems or issues as that arise. Of course like us all in the business world manufacturers need to identify their critical value adding processes and business activities, […]

Cyber Expo Ireland – Bringing The Whole Cyber Secuirty Ecosystem Together

Cyber Expo Ireland – Bringing The Whole Cyber Security Ecosystem Together Today’s most active battlefield is taking place online. The idea of cyber warfare still seems like science fiction for many, however it’s happening every minute of every day. Of course, this has sparked a huge interest and need for Cyber Security to protect our […]

Business Continuity- Who You Gonna Call?

Business Continuity- Who You Gonna Call? Following an incident, you may find that you can’t perform a recovery yourself, you may need a professional to help restore your business. So of course the question is… Who you gonna call?(Sorry, I couldn’t resist) Your first thought after an incident should be safety. If the workplace is […]

To install or not install that is the question (or is it?)

To install or not install that is the question (or is it?) OK, so everyone has got the message… ‘new updates available – install now!’ However, the installation of updates has always been a hit and miss affair, we only typically look at updates when we are experiencing a problem. Of Course then when you […]

Business Continuity – Calling in the Experts (Part 2)

Business Continuity – Calling in the Experts (Part 2) Before we get started, there’s a lot going on with clear crypt this month, They’re having a competition at the moment to win one of their ClearCrypt Secure 8GB Encrypted Storage Devices, to be in with a chance of winning click here Also for a limited time only […]

Competition Time!

Clear Crypt Competition Click Here to Enter our competition to be in with the chance to win one of our brand new ClearCrypt Secure 8GB Encrypted Storage Devices. It is a Slim, Secure and Reliable Storage device which is software free, ensuring multi platform support while on the move. Real-time AES 256bit encryption Software free Aluminium Casing True […]

Data Deposit Box – Guardians Of Your Galaxy!

Beside individuals, an association’s most important resource is it’s DATA! In our own  world, regardless of how large or little, our DATA is vital… it supports our clients, it educates our staff, it makes us a profits and it protects us. It’s key that we guard it! I’m certain you have heard of or, maybe even, […]

Cloud 24X7- Next Generation

These days everyone’s talking about Millennials, the Millennial characteristics will vary by region and of course social and economic conditions. However, this generation is generally marked by an increased use and familiarity with communications, digital technologies and media. But what will the characteristics be for the new Millennials? What about the next generation?  I’m not going […]

Cloud Backups – It’s a matter of When? Not If!

When I attended Digital DNA at St George’s Market, I noticed a recurring theme… Data. Everywhere I looked, people were talking about data and how it was being used – from Google marketing through to driverless cars. What I didn’t hear people talking about was how we manage that data! I was reading a Gartner […]

The top 5 business continuity questions

1.     Who is responsible for running exercise scenarios? It’s everyone’s responsibly to get involved, but you need someone to ‘take charge’ and orchestrate the whole thing. Depending on the size of the organisation, that person should be a senior manager or specifically, a business continuity manager. Don’t just focus your attention on the people who are […]

The history of backups

Here goes… from earliest man we have tried to find ways to store and preserve information. In today’s technological age when people hear the words ‘storage’ or ‘computer storage’ they normally think about USB, NAS or SAN’s. Technology such as the floppy disk or even the punch card are nearly forgotten. If we look even […]

A series of unfortunate events

Part of your planning is sitting down and essentially predicting and planning for your worst nightmare! Sounds bad, doesn’t it? Sitting down and thinking about a ‘series of unfortunate events’ isn’t something that makes us jump for joy. It is however essential to develop effective exercise scenarios… (they must be realistic, no alien scenarios allowed!) […]

WannaCry Ransomware

Is WannaCry a Wake Up Call?

Over the weekend deadly WannaCry virus, the biggest attack of its kind ever recorded, swept the globe which has resulted in sleepless nights for many IT and security professionals in over 150 countries. With the ransom clock steadily ticking choices had to be made… to pay or not to pay? As the attack begins to […]

The big three

I guess it’s an occupational hazard! But I have read a lot of articles about data security.  Admittedly it can be overwhelming at times, so what I do like is short bursts of information. I have picked 3 security threats and some practical advice and kept it high level, hope it helps! 1.     Mobile Devices Data […]

Got your back (up)

We’ve all heard the term ‘have someone’s back’ but what does it mean? Urban Dictionary definition (because of course)… “You watch out and be a second set of eyes for someone. You look out for their best interests and let them know if they have missed something. You will stick up for them” I was flicking […]

Practise makes perfect

In our last Business Continuity blog, We talked about the importance of validating recovery procedures Practice makes perfect of course… let’s discover the 4 different exercise levels we can implement to find the holes in our plans. The whole point is to learn from exercises so that you can apply the same knowledge to a […]

The Belts And Braces Approach

Going ‘belt and braces‘ is a double assurance against having one’s trousers fall down. In today’s digital age, if we think of trousers as your organisation’s data, then a ‘belt and braces‘ approach is it’s storage. I don’t think I need to say too much about the rise of cyber risks!       ·        In […]

But Why Validate Your Recovery Procedures

Athletes need to prepare with training, planning and of course, stretching before a big race. That way, they know they will perform at their very best. The same goes for Business Continuity, with the right planning and preparation your business can continue to perform well, even during a crisis. The reality is, disruptions don’t give […]

Validate your Business Continuity plan

An important way of avoiding a crisis in the first place is to ensure your readiness for a disruptive event. We have broken down this critical task so you can be confident the business continuity (BC) system you are putting in place will work effectively when it matters: Although people often use the terms  “test” […]

What’s Next For Cyber Security This Year

The world of Cyber Security has had a busy year, we have seen numerous high-profile incidents, below are a few of the headline grabbers… Apple v FBI Ukraine Power Grid Attack – Phishing Attack Tesco Bank TalkTalk Ransomware – The sheer volume and creativity There is new legislation coming into force in 2018 and with […]

Crisis recovery guidlines

In our last blog we looked at what a crisis actually is, today we will examine how we move on when the dust begins to settle! Just when you thought it was safe to go back into the water… The first thing to remember is to NOT to unilaterally decide the crisis is over. Assess […]

Issues becoming crisis

Crisis is a word you will hear a lot when it comes to business continuity. So what is a crisis? A crisis is: Unexpected Hard to manage Very serious indeed There are four crucial aspects of crisis…   Sudden crisis This Happens without warning Escalates rapidly Has a high profile & impact   Slow-onset crises […]

Business Continuity; An Innovative Answer

Ever hear the phrase ‘the true ones are the best?’ well we tend to agree. Probably the best way to emphasise a point is through real life experiences, so today we’re sharing the real life experiences of a business continuity client that we recently visited and their efforts to embrace business continuity and the advances […]

Strategies for Business Continuity

Ok, so let’s look at selecting the right Business Continuity Strategies for your business. Gather what you need Put simply, for a good business continuity strategy, all your critical activities need to be considered and a continuity and recovery plan that suits be put in place. To help here is some easy to remember business […]

Fatigue

How does the cyber security industry get its message across? Regardless of whether it’s charity, donor or compassion there is a constant risk of audience fatigue.   US National Institute of Standards and Technology (NIST) recently released a report which found that people are beginning to recoil from the constant bombardment of “cyber advice” This […]

Half Baked Business

What matters most to your business? Perhaps it’s something you never thought of in terms of this exact question. So how do we answer this question? Well let’s look at it with regards to Business Impact Analysis (BIA). Don’t worry, put simply, this is where we look at the potential effects of an interruption to […]

BAN ALL CARS!

SO… The title is a little controversial right? Now-a-days banning cars is pretty much not an option due to there being 1.2 Billion of them driving around (give or take a couple). Where am I going with this? Well! As a species, we accept ‘Risk v Benefit’ as part of our lives. We, as humans, […]

PASSWORD: LEGENDARY

There is a great mythos behind passwords and the first ever use of one. They have become the bane of every computer user for years, the frustration of having to remember one, the thought that goes into making one and of course there’s the dreaded ‘forgot password’ button for when things get desperate! So who’s […]

BUSINESS CONTINUITY HEALTH CHECKLIST- TOP TIPS!

Lets take some time to discover how you can really get to grips with your Business Continuity Plan. The same simple rules apply regardless of the size and complexity of your business. As with everything, it is always best to start at the beginning… ..And again, as with everything, to fix something you must first know […]

THE DARK SIDE OF ‘AS-A-SERVICE’?

A new way of doing things in recent years has become the ‘as a service’ way of thinking. This gives people the opportunity to plug into services that deliver intelligent, simple operations whenever you need them. Something that is expected nowadays is an ‘On Demand’ service. You only have to look down at your hand […]

BUILDING A GREAT BUSINESS CONTINUITY TEAM

In today’s blog I want to talk about the team, after all the team is the foundation of any business, they understand the workings of the business and they understand the realities of what it takes to keep the company running. Some members of your team probably know more about your business “operationally” than you […]

SHADOW IT + BIMODAL

In the ever more demanding field of cyber security, Gartner has assumed an advisory stance – Shadow IT & Bimodal are two methods devised recently. Shadow IT is one way of describing a company’s IT systems and solutions whilst remaining “outside” the usual restraints.  These solutions are business-driven and are defined and executed by non-IT business units.   Bimodal is a […]

An introduction to business continuity – disaster survival & recovery

continuity involves incident prevention, surviving disruption and recovery planning.’ If an organisation is to survive a period of disruption and recover from it, they must effectively plan ahead – this is the essence of business continuity. All organisations should implement business continuity practices, in order to understand all processes/systems and promote continuous improvement. Maximise Recovery […]

Four steps to an effective patch management plan

Patch management is the process of utilising a suitable strategy to uncover vulnerabilities within a computer, system or network. Simple antivirus software will not protect against all forms of malware; therefore, a multi-layer approach is needed in order for full network protection. Patching works to cover up the ‘holes’ in which a hacker can gain […]

The human factor behind compromised passwords

A lot has been written on passwords and their role in keeping our networks and data safe and secure, with malware infections spreading more rapidly than ever (it is estimated that 1 in 4 people will fall victim to a data breach by 2020 – “Naked Security”). In the immortal words of Alexander Pope “To […]

Ransomware Threats Prevalent in UK and Irish Organisations

Crypto-ransomware threats are increasing extensively on a global scale. However, a study carried out in November 2015 has revealed that approximately half of internet users cannot diagnose and establish the harm that this malware can cause to their machines and networks. There have been 1.7 million known users affected by ransomware scams in the UK. […]