<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Chris Payne

Senior Technical Consultant, Infinigate UK
Find me on:

Recent Posts

4 NIS Directive Services VARs can provide to their Customers

Posted: 19 April 2018

With the GDPR (General Data Protection Regulation) getting all the headlines in the past two years, it is hard to garner any attention on anything else. Yet for good reason, the GDPR is widely focused and will for some challenge the way they take their offering to market. However, there have been developments, both legislative and not, in the past two years which can present opportunities for VARs (Value-Added Resellers) and solution providers alike.

Read Article

5 GDPR Things to Consider for your MSSP Offering

Posted: 05 April 2018

Like many an industry trend before, MSSP (Managed Security Service Provider) appears to be trending among IT teams and security practitioners alike; embracing the cloud and hosting technologies to relieve the burden of ownership and maintenance, retain security practices and benefit from subscription models of service.

Read Article

5 Last Minute Steps to GDPR Readiness

Posted: 21 March 2018

With less than 100 days to go until the enforcement of the GDPR (General Data Protection Regulation) and the relevance of this blog post on a short time span, a certain level of panic may begin to consume those who have only just started to take this subject seriously.

Read Article

GDPR: Seek re-consent or burn your contacts database, really?

Posted: 07 March 2018

So, you've been told that you need to destroy your prized contacts database unless you can prove that you have consent to process the personal data of those that you store. Maybe you can send out communication asking those contacts to re-consent... but how many would? And what about the problems which Honda incurred by doing this?

Read Article

Lead Acquisition at Events, GDPR Style

Posted: 28 February 2018

I am certain that there is likely to be nobody reading this blog who has never been to a trade fair or industry event. Huge gatherings of like-minded individuals, peers or even just the curious jostle past one another, between extravagant stands paid for vendors promoting their wares.

Read Article

5 Things to Know About the EU's Upcoming ePrivacy Regulation

Posted: 27 February 2018

With May 2018 within touching distance, you may think it will soon be all over. The GDPR (General Data Protection Regulation) is taking its toll and fatigue around the topic has undoubtedly begun to set in. Yet, it is only just the beginning, as one door closes another door opens, to make way for the European Union’s ePrivacy regulation.

Read Article

What to do when you receive a "Withdrawal of Consent" under the GDPR

Posted: 14 February 2018

The GDPR (General Data Protection Regulation) is a complex beast, of which there seems to be an endless supply of regurgitated information online, in print and at various events. What is lacking however is practical information on how to handle its requirements operationally.

Read Article

An Introduction to Operational Technology and it's Security: 5 Key Facts

Posted: 31 January 2018

The industrial revolution of the 18th century was famously invoked by a step up in technology. Industries which had traditionally relied on work by hand started to embrace a new future of machine use to dramatically enhance output levels, efficiency and financial return.

Read Article

What GDPR lessons can we learn from the Uber data breach?

Posted: 24 January 2018

Uber, the world's most famous disruptor of the taxi industry has never been short of controversy. Whether it be accusations of poor employment practices, sexual harassment at HQ or their never ending legal duels with various city councils, the workload for Uber’s public relations department is certainly colourful to say the least.

Read Article

Everything You Need to Know About CCTV and the GDPR

Posted: 08 January 2018

'The devil is in the detail' is a phrase which comes to mind when speaking about the GDPR (General Data Protection Regulation). The obvious topics surrounding the application of the regulation's articles have been extensively discussed, leaving behind those tricky and often overlooked details.

Read Article

Do you know what "The Right to Forget" in GDPR terms really means?

Posted: 03 January 2018

Wherever there exists a conversation about the GDPR (General Data Protection Regulation), you can guarantee a handful of infamous topics are covered. The scaremonger worthy administrative penalties, the notion of consent being the lawfulness to rule all others and the Lord Lucan of rights, the right to forgotten.

Read Article

Will purchasing contact data lists become illegal under GDPR?

Posted: 08 November 2017

In the pursuit of writing about the practical application of the GDPR (General Data Protection Regulation) rather than reciting the contents of the freely available regulation document, I am writing this blog to answer a commonly asked question regarding the purchasing of marketing contact lists post May 2018.

Read Article

How will GDPR affect how we use LinkedIn?

Posted: 01 November 2017

If you haven’t heard of the GDPR (General Data Protection Regulation), quite frankly I am in envy of you. Never has there been an IT security topic so heavily covered by those who wish to show they are literate and can re-write what they have read. Astronomical fines, forbidden non-consensual communication and mighty data subjects wielding new found rights have all been covered repeatedly and tirelessly.

Read Article

7 GDPR Opportunities for the IT Security Channel

Posted: 18 October 2017

As far as titles go, this one will likely prove divisive. On one hand, there are a plethora of IT security solution and service providers who are keen and hungry for the opportunity to work with customers on their preparations for the GDPR. On the other, doubt is sowed by those who question the ability of anyone who claims to know anything about the GDPR, simply because there is nobody with experience in application of a regulation which yet to come into force.

Read Article

Anti-Spam & Phishing Checklist: 5 Techniques which all Mail Filters should have switched on

Posted: 27 September 2017

Email is unwaveringly consistent in upholding the theory of equal opposites. On one hand, it has enabled businesses to flourish in the electronic age with cheap and easy communication thus making it the default method of message exchange, however on the other, that direct-to-user route has meant that it remains the number one infection vector of choice for malware and phishing attacks since the 90's.

Read Article

Was your Email Address found in the World's Largest Spambot?

Posted: 13 September 2017

The average IT security administrator has much to be concerned about today; the threat of ransomware bringing their businesses to a halt, their readiness for the incoming GDPR (General Data Protection Regulation), trusted employees forever on the cusp of potential betrayal and now the return of the oldest foe of them all... spam.

Read Article

GDPR Challenge Number 1: Where to Begin?

Posted: 07 September 2017

Without much hesitation, I am certain that my experience of the past eighteen months has been similar to others. Attending and consuming countless GDPR focussed conferences, webinars, panel discussions, blog posts and webinars in an effort to strengthen my own grasp of the topic and to trade suggestions on real-life application with peers. There is much to gain from such occasions.

Read Article

The Six Commandments of the GDPR

Posted: 29 August 2017

Otherwise known as the measuring stick by which your some of your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed. Unquestionable and pure in nature, they are somewhat rarely acknowledged for one simple reason; five of the six have no real application in helping to peddling products and solutions.

Read Article

The UK Data Protection Bill 2017 vs. The GDPR

Posted: 17 August 2017

It's almost six months until the implementation date of the European GDPR (General Data Protection Regulation) and the UK begins its journey toward the club's exit door. The release of the DPB (Data Protection Bill 2017) has confirmed the UK's position on how it plans to remain tied, yet distinct from its European neighbours.

Read Article

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

Posted: 10 August 2017

The IT security industry, having grown each year since the dot-com bubble, is famously known as being a recession-proof investment. As more of our lives and our businesses grow to rely on the benefits of IT and the internet, so does the need to protect that reliance from any event which threatens it.

Read Article

What Happened to the World's Most Famous Bitcoin Wallets?

Posted: 26 July 2017

2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money.

Read Article

Navigating the GDPR Seas of Third-Party Processing

Posted: 06 July 2017

If the GDPR were a sea, it would be vast, confusing and in some places its shallow rocky geography would threaten metaphorical ships with disaster. Guidance for any would-be captain is plentiful; just searching for the term ‘GDPR’ in Google yields hundreds of thousands of results. From the basics of learning your portside and starboard to the more practical of how to protect your vessel from the supervisory authority’s arsenal, much is covered. That is with the exception of working with third-parties and most importantly, cross-border processing, something which is a normal aspect of business today, irrespective of size. This darker corner of the regulatory map is less often explored and must begin with identifying who is wearing the hat of the data controller and the data processor.

Read Article

Passwords are not Dead but Complex Ones are

Posted: 21 June 2017

In a world of ever faster computing power, the thought that passwords should become simpler appears to be going against the grain. Yet, in May of 2017, the highly regarded American agency, NIST (National Institute of Standards and Technology), ended its consultative period for a new report into password guidelines. Contained within were some surprises about what we have come to believe about the security of complex passwords.

Read Article

Eight Steps to Prepare for a Summer of Ransomware

Posted: 14 June 2017

After the events of May 2017, cyber security teams may finally be able to eat from the adults table of respect at organisations worldwide. What had been predicted, yet often ignored for more than a decade, had materialised in the form of the WannaCry cyber attack; a service-extinction level event which rendered some of the world’s most famous brands and the UK's health service crippled and ultimately red-faced.

Read Article

WannaCry: The Worlds Cybercrime Wake-Up Call

Posted: 15 May 2017

If there was a person in the world who didn’t know what ransomware was, they probably do now. On Friday the 12th of May 2017, what was initially dismissed as an issue on NHS (National Health Service) England’s IT system quickly developed into a global incident involving computers, laptops and servers in 150 (and still counting) countries.

Read Article

 

Share via:

    

Subscribe to VSEC Blog Updates

Popular Posts