Cyber Essentials is a UK-Government-backed cyber-security scheme which encourages businesses to take steps in order to prevent and protect themselves against the threat of cyber-attack. What you might not be aware of, however, is how beneficial a Cyber Essentials certification can be for you and your customers. Read More
Speaking at the lecture for the Institute of Chartered Accountants in England and Wales in London earlier this year, Elizabeth Denham of the ICO, discussed the role of accountability in GDPR and how people must adjust their mindsets in regard to how we think about data protection as well as what GDPR may actually look like in reality.
Step 1 to CE: Boundary Firewalls and internet gateways
A firewall or gateway protects internal networks and systems against unauthorised access from the internet. They are designed to provide a basic level of protection for internet users. All business networks should have a properly configured firewall in place. The firewall monitors all network traffic, whilst identifying and blocking any traffic which can be harmful.
The ICO (Information Commissioner’s Office) has produced a checklist, highlighting the main steps organisations can take immediately to prepare for the GDPR, which will apply from 25th May 2018.
It is important to use this checklist and other ICO resources to identify the main differences between the current Data Protection Act (DPA) and the GDPR.
Below are three steps taken from the list which are worth knowing about! Read More
As you probably know already, schools and universities are not immune to attacks from disgruntled employees or other insiders. However, there is another key issue for school leadership teams that is unique to the education sector: students!
As CyberSmart turns 1 year old, we are taking a moment to pause and reflect. This year was huge for us, individually and as a team. We had a vague idea, built a platform, got our first paying customers and closed a Pre-Seed round. At CyberSmart we believe in transparency, not only in regards to data, but also transparency in everything we do, transparency towards our stakeholders and eco-system. Hence, without further ado – here is what happened in 2017 at the CyberSmart HQ in East London. Read More
The legal sector remains a hot target for the full spectrum of threat actors; cyber-criminals, hacktivists, state-sponsored groups. This is largely due to the wealth of sensitive data held within the industry. That includes; patent data, merger and acquisition information, protected witness information and negotiation information. The scope is vast and not limited to the above list. Legal firms are equivalent to a pot of gold for any of these groups. Read More