Invoice Fraud – Major Threat in 2019

Criminals are turning to sophisticated methods of scamming businesses out of money, convincingly posing as regular suppliers to trick them into changing supplier bank account payee details. Despite £93m being lost to invoice fraud last year, over 43% of businesses...

Access Rights – ISO27001

TOPIC: Managing Access Rights for New Starters All too often I visit organizations where a member of staff has either been disciplined or left the business – where it turns out that data was compromised by unauthorised or un-restricted access by a user that did...

The Cyber Issue

Many SME’s rely heavily on their ‘e-commerce’ web-sites to drive their business models. Indeed many traditional forms of sales and marketing are possibly ‘semi-redundant’ in today’s fast on-line search functions and retrieval methods. However SME’s appear to be...

Effective Management of Data Security Questionnaires

Having been practicing in Data Security for 7 years, I am always amazed at the ‘un-coordinated’ approach that SME’s take to the effective management of data security questionnaires from their key / main customers. Data security questionnaires really seem to have...

‘Free’ WiFi Spot Guidance

Free ‘WiFI’ here! We see the signs everywhere from McDonalds to restaurants, hotels and airport departure lounges. With some people addicted to having internet access on their laptop, tablet or smartphone the lure of free wi-fi is all too tempting. With so much of our...
Data Security Best Practices

Data Security Best Practices

The start of a new year is a really good opportunity to think about the issues of data security in your business and make some changes to your regular information security practices. Here are some simple actions you can take now. 5 year new resolutions to keep your...