+44(0)1633 276003 [email protected]

GDPR – Where To Start?

GDPRThe new General Data Protection Regulation (GDPR) comes into force on May 25th 2018. It will affect every business and change many established business practices and business models. It will also require a fair bit of work to ensure compliance, so if you aren’t already working on that, you need to learn about this and start now.

I was going to do a lot of research and attempt to write something about how all businesses need to be ready for it. However, I’m not a lawyer, and giving bad advice could be risky. Also, there is no way that I could come up with something as clear or comprehensive as Heather Burns’ white paper on GDPR for Business Owners & Senior Executives.Read the rest

Meltdown & Spectre Simplified

Meltdown & Spectre cybersecurity vulnerabilities

Meltdown & Spectre

So, 2018 has started with disclosure of two huge cybersecurity vulnerabilities, called “Meltdown” and “Spectre”. These are not like most of the “exploits” that hackers use. They affect almost all modern computers.

Sites like MeltdownAttack.com and Defiant.com (previously “WordFence”) have covered the tech details well. So, here’s a simplified summary of what non-techies need to know.

Why You Should Care About Meltdown & Spectre

Most vulnerabilities affect software. Meltdown and Spectre affect CPUs — the core computer chips — mostly those built by Intel since 1995. So they don’t just affect PCs, or Windows, or Macs, or Linux. They affect computers, regardless of what software or operating systems you use. In short — yes, this affects your computer(s) and phone(s).Read the rest

It’s All About Trust – Increasing Sales With SSL Security

SSL security trust mark“Trust me.” That’s the most vital message any website can convey. Without trust, visitors just leave.

However, most folks expect to be trusted, even when they’re wary about trusting others. Whilst that’s fine for dealing with folks in person, websites need to plan to build trust. We do that by providing quality content, good service – and “trust marks” like testimonials, “About” pages, Privacy Policies and other reassurances.

Of course, search engines want to promote quality, trustworthy sites, so many of these reassurances can be good for SEO, too. So online, trust doesn’t just enable sales – it actively increases sales.

…and Google just changed the game.

Google’s Great SSL Plan

So, as you may know, Google uses hundreds of signals to assess the quality and trustworthiness of websites.… Read the rest

Anti-Malware Solutions – 5 Vital Elements

Anti-malware solutions“Malware” covers a huge range of threats including viruses, spyware, ransomware and more. So, anti-malware solutions must defend on several fronts. Many include anti-spam and firewall solutions too, as these block common malware sources.

Some operating systems are more secure than others, but nothing can be 100% secure. Malware is built to work around any predictable default protections. So, whilst it’s worth keeping built-in anti-malware up to date, you’ll need more.

Essential Anti-Malware Components

So, what features should you look for in your anti-malware solution? Well, there are five that no system should be without.

1. Anti-Virus

The most obvious requirement is an effective, up-to-date anti-virus system. These mainly handle:

  • Viruses – which need human interaction to spread
  • Worms – which self-replicate.
Read the rest

Password Security Made Simple

Password securityPassword security is the first — and often weakest — line of defence against cyber-attacks. Unfortunately, passwords are the cybersecurity measure we all love to hate.

Techies take a lot of flak for implementing password security, but we didn’t invent it. Call them passwords, PINs, keys or whatever you like — they all work the same way: a pattern grants access to a restricted resource. As such, password security measures have existed throughout history and will be around in some form for a while yet.

That said, passwords have never been as common as they are today — and cracking them was far harder without computers. These days, weak passwords only create a false sense of security. So, we all need to know how to use passwords effectively.… Read the rest

Cybersecurity Basics

Basic CybersecurityNo-one can afford to ignore basic cybersecurity. With ransomware on the rise, it is more important than ever.

This will be the first in a series of articles about ways to keep the people and data you care about safe online. Among the things I plan to cover are:

  1. Why Bother With Cybersecurity? (this article)
  2. Password Security Made Simple
  3. Anti-Malware Solutions – 5 Vital Elements
  4. Trust – Increasing Sales With SSL Security
  5. Backups
  6. Privacy
  7. Software Updates
  8. The “Internet of Things” (IoT)

…and more. I may write a bit about Website Security too, though BestVPN’s Blogger’s Guide To WordPress Security has already covered that well.

So, with that said, let’s deal with the first question that far too many people ask…

Why Bother With Cybersecurity?

Read the rest