+44(0)1633 276003 [email protected]

GDPR — Where To Start?

GDPRThe new Gen­er­al Data Pro­tec­tion Reg­u­la­tion (GDPR) comes into force on May 25th 2018. It will affect every busi­ness and change many estab­lished busi­ness prac­tices and busi­ness mod­els. It will also require a fair bit of work to ensure com­pli­ance, so if you aren’t already work­ing on that, you need to learn about this and start now.

I was going to do a lot of research and attempt to write some­thing about how all busi­nesses need to be ready for it. How­ever, I’m not a law­yer, and giv­ing bad advice could be risky. Also, there is no way that I could come up with some­thing as clear or com­pre­hens­ive as Heath­er Burns’ white paper on GDPR for Busi­ness Own­ers & Seni­or Exec­ut­ives.

If you have a busi­ness of any size, wheth­er it’s online or not, or if you’re even just at the stage of con­sid­er­ing set­ting up a busi­ness, you need to read that.… Read the rest

Meltdown & Spectre Simplified

So, 2018 has star­ted with dis­clos­ure of two huge cyber­se­cur­ity vul­ner­ab­il­it­ies, called “Melt­down” and “Spectre”. These are not like most of the “exploits” that hack­ers use. They affect almost all mod­ern com­puters.

Sites like MeltdownAttack.com and Defiant.com (pre­vi­ously “Word­Fence”) have covered the tech details well. So, here’s a sim­pli­fied sum­mary of what non-tech­ies need to know.

Why You Should Care About Meltdown & Spectre

Most vul­ner­ab­il­it­ies affect soft­ware. Melt­down and Spectre affect CPUs — the core com­puter chips — mostly those built by Intel since 1995. So they don’t just affect PCs, or Win­dows, or Macs, or Linux. They affect com­puters, regard­less of what soft­ware or oper­at­ing sys­tems you use. In short — yes, this affects your computer(s) and phone(s). It even affects cloud com­puters.… Read the rest

It’s All About Trust — Increasing Sales With SSL Security

SSL security trust mark“Trust me.” That’s the most vital mes­sage any web­site can con­vey. Without trust, vis­it­ors just leave.

How­ever, most folks expect to be trus­ted, even when they’re wary about trust­ing oth­ers. Whilst that’s fine for deal­ing with folks in per­son, web­sites need to plan to build trust. We do that by provid­ing qual­ity con­tent, good ser­vice — and “trust marks” like testi­mo­ni­als, “About” pages, Pri­vacy Policies and oth­er reas­sur­ances.

Of course, search engines want to pro­mote qual­ity, trust­worthy sites, so many of these reas­sur­ances can be good for SEO, too. So online, trust doesn’t just enable sales — it act­ively increases sales.

…and Google just changed the game.

Google’s Great SSL Plan

So, as you may know, Google uses hun­dreds of sig­nals to assess the qual­ity and trust­wor­thi­ness of web­sites.… Read the rest

Anti-Malware Solutions — 5 Vital Elements

Anti-malware solutions“Mal­ware” cov­ers a huge range of threats includ­ing vir­uses, spy­ware, ransom­ware and more. So, anti-mal­ware solu­tions must defend on sev­er­al fronts. Many include anti-spam and fire­wall solu­tions too, as these block com­mon mal­ware sources.

Some oper­at­ing sys­tems are more secure than oth­ers, but noth­ing can be 100% secure. Mal­ware is built to work around any pre­dict­able default pro­tec­tions. So, whilst it’s worth keep­ing built-in anti-mal­ware up to date, you’ll need more.

Essential Anti-Malware Components

So, what fea­tures should you look for in your anti-mal­ware solu­tion? Well, there are five that no sys­tem should be without.

1. Anti-Virus

The most obvi­ous require­ment is an effect­ive, up-to-date anti-vir­us sys­tem. These mainly handle:

  • Vir­uses – which need human inter­ac­tion to spread
  • Worms – which self-rep­lic­ate.
Read the rest

Password Security Made Simple

Password securityPass­word secur­ity is the first — and often weak­est — line of defence against cyber-attacks. Unfor­tu­nately, pass­words are the cyber­se­cur­ity meas­ure we all love to hate.

Tech­ies take a lot of flak for imple­ment­ing pass­word secur­ity, but we didn’t invent it. Call them pass­words, PINs, keys or whatever you like — they all work the same way: a pat­tern grants access to a restric­ted resource. As such, pass­word secur­ity meas­ures have exis­ted through­out his­tory and will be around in some form for a while yet.

That said, pass­words have nev­er been as com­mon as they are today — and crack­ing them was far harder without com­puters. These days, weak pass­words only cre­ate a false sense of secur­ity. So, we all need to know how to use pass­words effect­ively.… Read the rest

Cybersecurity Basics

Basic CybersecurityNo-one can afford to ignore basic cyber­se­cur­ity. With ransom­ware on the rise, it is more import­ant than ever.

This will be the first in a series of art­icles about ways to keep the people and data you care about safe online. Among the things I plan to cov­er are:

  1. Why Both­er With Cyber­se­cur­ity? (this art­icle)
  2. Pass­word Secur­ity Made Simple
  3. Anti-Mal­ware Solu­tions — 5 Vital Ele­ments
  4. Trust — Increas­ing Sales With SSL Secur­ity

…and more. I may write a bit about Web­site Secur­ity too, though BestVPN’s Blogger’s Guide To Word­Press Secur­ity has already covered that well.

So, with that said, let’s deal with the first ques­tion that far too many people ask…

Why Bother With Cybersecurity?

Well, the obvi­ous answer is, “Cyber­se­cur­ity pro­tects the people and things we care about”.… Read the rest