<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

5 Tips on How to Write a GDPR Ready Privacy Policy

Posted: 20 June 2018

In the scramble of the final days leading up to the 25th of May 2018, Google crawl bots would have noticed universal updates taking place across the internet. Privacy policies for an unquantifiable number of organisations and companies were being adapted to fit the GDPR.

Read Article

GDPR & Personal Data in the Public Domain

Posted: 30 May 2018

The 25th May 2018 has arrived and you as a data subject have been empowered with Europe's most ambitious and forward-thinking data protection regulation to date, the GDPR. As the ultimate steward of your personal data, you now have control over its use in most scenarios making data privacy a fundamental right. But what about instances where your personal data is available publicly? Is personal data fair game, once it is in the public domain?

Read Article

Preventing and recovering from a ransomware attack

Posted: 23 May 2018

It’s been almost a year since a zero-day ransomware attack called WannaCry infected hundreds of thousands of machines all over the world. Hackers encrypted files on infected computers and attempted to extort a ransom from their victims. Those infected with WannaCry were initially demanded to pay $300 in Bitcoin. Those affected were exploited by unpatched vulnerabilities in the Windows SMB service. Microsoft knew of the potential threat months before however, several businesses do not keep up on their patches which caused them to be an easy target for a WannaCry attack.

Read Article

Exercising Your Legitimate Interests with the GDPR

Posted: 16 May 2018

By now you have probably learned that the processing of personal data does not always require an act of consent. Whilst much of the internet is obsessing over consent, re-consent and double opt-in consent, you have correctly discovered that it is not the only way to legally process personal data.

Read Article

MailChimp and the Curse of the GDPR

Posted: 03 May 2018

Marketing automation solutions have come along way in the past five years. Once used for mass emailing, now expanded to include an array of interactivity features such as blogs, landing pages and pop-ups, all to enrich the process of inbound marketing. But as the GDPR (General Data Protection Regulation) enforcement data looms nigh, how ready are the likes of MailChimp? and what do you need to know as their data controller?

Read Article

8 IT initiatives to include in your plans this spring

Posted: 25 April 2018

The new year has come and gone. Now that your company’s budget is on track, it’s time to start cleaning house (or your network) with IT initiatives that will protect your business from a malware attack and organize your data.

Read Article

4 NIS Directive Services VARs can provide to their Customers

Posted: 19 April 2018

With the GDPR (General Data Protection Regulation) getting all the headlines in the past two years, it is hard to garner any attention on anything else. Yet for good reason, the GDPR is widely focused and will for some challenge the way they take their offering to market. However, there have been developments, both legislative and not, in the past two years which can present opportunities for VARs (Value-Added Resellers) and solution providers alike.

Read Article

3 Emerging Innovations in Technology that Will Impact Cyber Security

Posted: 11 April 2018

The war between security experts charged with the responsibility of protecting information and cyber-criminals who threaten to compromise the integrity of data for different entities has become a cat and mouse game.

Read Article

5 GDPR Things to Consider for your MSSP Offering

Posted: 05 April 2018

Like many an industry trend before, MSSP (Managed Security Service Provider) appears to be trending among IT teams and security practitioners alike; embracing the cloud and hosting technologies to relieve the burden of ownership and maintenance, retain security practices and benefit from subscription models of service.

Read Article

Secure your accounts with a passphrase, not a password

Posted: 28 March 2018

Unfortunately, insecure passwords are not a thing of the past. As companies continue to grow, employees will use more and more applications that require a passcode. It’s time you enforce a new strategy to improve the security of your network.

Read Article

5 Last Minute Steps to GDPR Readiness

Posted: 21 March 2018

With less than 100 days to go until the enforcement of the GDPR (General Data Protection Regulation) and the relevance of this blog post on a short time span, a certain level of panic may begin to consume those who have only just started to take this subject seriously.

Read Article

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

Posted: 14 March 2018

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information security from time-to-time. As such, you probably get approached to opine on a summary of what frightens you the most, and how to drive to sum navigable preventative steps.

Read Article

GDPR: Seek re-consent or burn your contacts database, really?

Posted: 07 March 2018

So, you've been told that you need to destroy your prized contacts database unless you can prove that you have consent to process the personal data of those that you store. Maybe you can send out communication asking those contacts to re-consent... but how many would? And what about the problems which Honda incurred by doing this?

Read Article

Lead Acquisition at Events, GDPR Style

Posted: 28 February 2018

I am certain that there is likely to be nobody reading this blog who has never been to a trade fair or industry event. Huge gatherings of like-minded individuals, peers or even just the curious jostle past one another, between extravagant stands paid for vendors promoting their wares.

Read Article

5 Things to Know About the EU's Upcoming ePrivacy Regulation

Posted: 27 February 2018

With May 2018 within touching distance, you may think it will soon be all over. The GDPR (General Data Protection Regulation) is taking its toll and fatigue around the topic has undoubtedly begun to set in. Yet, it is only just the beginning, as one door closes another door opens, to make way for the European Union’s ePrivacy regulation.

Read Article

Don't let Cyberloafing Crush Productivity

Posted: 21 February 2018

What do you call it when users get online for some reason, find themselves on a part of the Internet that is not, strictly speaking, work related, and then find that an hour or more of productive time has been lost to the ether? Well, maybe what you call it is more accurate, but the worksafe word is “cyberloafing,” and it’s costing your business big money.

Read Article

What to do when you receive a "Withdrawal of Consent" under the GDPR

Posted: 14 February 2018

The GDPR (General Data Protection Regulation) is a complex beast, of which there seems to be an endless supply of regurgitated information online, in print and at various events. What is lacking however is practical information on how to handle its requirements operationally.

Read Article

WPA3: Is it just filling in the KRACK’s or do we finally have the wireless security we need?

Posted: 07 February 2018

At the recent Consumer Electronics Show (CES) the Wi-Fi alliance announced WPA3; a new security certification which promises to address the weaknesses of WPA2 and adds a range of much needed enhancements to wireless security.

Read Article

An Introduction to Operational Technology and it's Security: 5 Key Facts

Posted: 31 January 2018

The industrial revolution of the 18th century was famously invoked by a step up in technology. Industries which had traditionally relied on work by hand started to embrace a new future of machine use to dramatically enhance output levels, efficiency and financial return.

Read Article

What GDPR lessons can we learn from the Uber data breach?

Posted: 24 January 2018

Uber, the world's most famous disruptor of the taxi industry has never been short of controversy. Whether it be accusations of poor employment practices, sexual harassment at HQ or their never ending legal duels with various city councils, the workload for Uber’s public relations department is certainly colourful to say the least.

Read Article

Meltdown and Spectre: The Holy Grail of Vulnerabilities

Posted: 17 January 2018

Just when we thought it couldn’t get any worse, yet another vulnerability has been discovered, but this time embedded into physical hardware. The threat is so severe that if used correctly, a simple action like running a computer program could allow someone to steal sensitive information such as passwords and credit card details. And guess what? Not a single piece of IT security software will save us. But hey, there is a patch for it...

Read Article

December 2017: The Month in Ransomware

Posted: 10 January 2018

Ransomware activity was on a fairly high level till mid-December but slowed down by the end of the month, perhaps due to threat actors’ holiday spree. Some of the newsmaking events included the onset of the first-ever blackmail virus targeting network-attached storage devices, the breach of California’s voter database, and arrests of CTB-Locker and Cerber distributors in Romania.

Read Article

Everything You Need to Know About CCTV and the GDPR

Posted: 08 January 2018

'The devil is in the detail' is a phrase which comes to mind when speaking about the GDPR (General Data Protection Regulation). The obvious topics surrounding the application of the regulation's articles have been extensively discussed, leaving behind those tricky and often overlooked details.

Read Article

Do you know what "The Right to Forget" in GDPR terms really means?

Posted: 03 January 2018

Wherever there exists a conversation about the GDPR (General Data Protection Regulation), you can guarantee a handful of infamous topics are covered. The scaremonger worthy administrative penalties, the notion of consent being the lawfulness to rule all others and the Lord Lucan of rights, the right to forgotten.

Read Article

The 2018 Cyberthreat Landscape - Predictions & Trends

Posted: 20 December 2017

As in recent years, 2017 has been marked by an increasing number of cyberattacks, and indications point to another tumultuous year as we head into 2018. In this blog post, we hear from Lastline's co-founder and CTO Giovanni Vigna on what he predicts to be the cybertrends of next year:

Read Article
Share via:
    

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts