|
The Government Communications Headquarters (GCHQ) has announced guidance for public sector technology chiefs to enhance data protection on lost or stolen smartphones. The advice focuses on configuration instructions, secure applications and training for staff members for security procedures on smartphones including iPhones, Windows Phone 7, Nokia and Blackberry devices.
Continue reading GCHQ announces smartphone security guidance for public sector workers
European E-commerce Regulations require your clients to provide certain information on your website and to make it easily accessible. There will be new rules about the way you handle cookies soon, too. Watch this space!
Continue reading Is your website legal?
Deputy Prime Minister Nick Clegg tells GPSJ that the government is taking cybercrime seriously in 2011. He was speaking to Stuart Littleford on a visit to Oldham in support of Elwyn Watkins for the upcoming by-election.
Continue reading Nick Clegg tells GPSJ the government is taking cybercrime very seriously
Siemens IT Solutions and Services has appointed a Head of Government Affairs to champion and develop relationships with central and local Government partners and trade associations. Steven Barker will take this ambassadorial role and lead engagements with public sector working groups concerned with standards in procurement, emergent and changing ICT strategies, plus the identification of innovative products, services and solutions.
Continue reading Siemens IT Solutions appointment
There are those who argue that the age of Cloud computing is merely in the minds of the more far-sighted IT visionaries. I have even met those whose businesses are indifferent to the Cloud. This indifference may cost them dearly – and soon. The UK’s new Coalition Government is implementing the -G-Cloud strategy (actually the strategy of the last Government) and there are some who claim that it will save the government £3.2bn from its annual £16bn IT budget of £16bn. That’s not just a big saving for the Government – it’s an obvious opportunity for suppliers who can ensure it is secure.
Continue reading Securing your privileged Identity – is anyone in control of Cloud security?
Before we can hope to achieve best practice, we need to address ‘best thinking’ – that is, to assess the patterns of thinking amongst our managers. How managers think will affect the way they manage and interact with their team, ultimately affecting the success or failure of a project or initiative.
Continue reading Best thinking drives best practice
With more than 82 per cent of the adult population now having access to the Internet, Tufin Technologies is warning IT managers of the need to prepare for a potential network overload situation as workers use their company IT resources for everything from multimedia greetings to videoconferencing connections to distant colleagues.
Continue reading Christmas network overload
The English National Screening Programme for Diabetic Retinopathy (ENSPDR) is working with Quicksilva, an independent provider of software to the private and public sector, and OLM Professional Services, a specialist provider of consultancy services to the health and social care sector, to put in place a framework for automating the sharing of data between GP practices and diabetic retinopathy screening programmes.
Continue reading QUICKSILVA AND OLM PROFESSIONAL SERVICES PROVIDE TECH LYNCHPIN FOR NATIONWIDE HEALTH SCREENING PROJECT
Keeping your staff’s personal information safe onlineMedia law expert Cleland Thom warns of the dangers of mixing business with pleasure
Continue reading Keeping your staff's personal information safe online
Trusteer’s research group has found that 30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism. These findings are based on monitoring of thousands of Phishing attacks.
Continue reading According to Trusteer 2FA powerless against Real time phishing attacks
With over 22,000 students, 800 teaching staff and 800 visiting lecturers, the University of Westminster prides itself on the ability to offer the best resources to facilitate learning. Undergraduates make up 75 per cent of students and more than 5,000 are international students from over 150 countries. Westminster is in the top 15 of most popular UK universities for international students and continuing to attract over-seas students is an important business driver for the organisation.
Continue reading Improved IT attracts students looking for access to the best resources
London, 18 Oct 2010 – Britain has published it’s National Security Strategy (NSS) which aims to inform thinking and drive policy over coming years. The document categorises threats faced by the nation in tiers highlighting the level of severity, outlines actions to be taken to mitigate such threats and formed the background to the Strategic Defence Review (SDR).
Continue reading National security strategy emphasises need for coordinated approach to counter-terrorism
18th October 2010 – Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver in a Cumbria hotel room. And, says Credant Technologies, the endpoint data security specialist, it seems that the USB stick contained details of the nuclear firm’s proposed workforce transfer from its Capenhurst operation in Cheshire to uranium specialist Urenco.one.
Continue reading Nuclear secrets revealed after unencrypted USB stick found in Cumbria hotel room
A TEEN who refused to give police officers an encryption password for his computer has been jailed for four months. The case is believed to be the first of its kind in Lancashire. Oliver Drage, 19, formerly of Naze Lane, Freckleton, was arrested in May 2009.
Continue reading PASSWORD TEEN JAILED
The ZeuS malware is coming of age and the infections are going to get a lot worse says Trusteer, the secure browsing services specialist. ZeuS malware has already been pushed extensively to users of Web 2.0 and/or social networking sites plus services such as Facebook, Twitter and, most recently, to users of the business social networking site, LinkedIn. Malware is also being modified by cybercriminals using coding toolkits to attack smartphone users. Recent postings by our IT security colleagues at S21sec about ZeuS targeting smartphone users are just the tip of the iceberg when considering the potential of these attacks.
Continue reading New Zeus malware attacks Smart phone and LinkedIn users
A simple mistake caused by the recipient auto-complete function within an email client resulted in Gwent Police committing what has been referred to as the first major UK data security breach since the new regulations introduced by the Information Commissioner’s Office came into force in April this year.
Continue reading How many police officers does it take to email 10,000 criminal records to a journalist by accident?
What do you get when the worlds leading analysis and data software provider merges with a leading open source intelligence research institute? Hopefully an even more successful business providing data faster and more accurately to its service users. At least that is the outcome i2 CEO Robert Griffin is hoping for as he heralded the group’s newly formed partnership with risk intelligence specialists World Check at its Brussels client conference in June.
Continue reading I2 Marriage made in Heaven
With October’s Spending Review announcement set to reveal the scale of the requirement for a radical re-evaluation of the Government’s role in providing public services; a two-day conference and exhibition in Birmingham on October 20th – 21st will provide the best opportunity this year to learn how digital technologies offer a proven route to delivering better public services for less.
Continue reading BEYOND 2010 TO SHOW DIGITAL TECHNOLOGY'S ROUTE TO EFFICIENCY AND REFORM
Overtis , vendor of VigilancePro, user activity management software, has announced a new Protective Marking feature to identify files that hold confidential information. The new feature has been developed in response to requests from UK police forces, to help them to comply with Management of Police Information Guidance published by the National Policing Improvement Agency (NPIA) on behalf of the Association of Chief Police Officers (ACPO).
Continue reading Overtis secures protectively marked Police files
The Royal Marsden is a National Health Service (NHS) Foundation Trust in England that specialises in cancer. Situated primarily over two main sites, one in Chelsea and one in Sutton, it also has a number of satellite locations, an area of the business that is being developed. Today, it has a staff of approximately 2,500 all of whom, in one form or another, are responsible for protecting the data they access.
Continue reading IronKey Stands Shoulder to Shoulder with The Royal Marsden to Secure Data
|
NEED AN UP TO DATE DATABASE?
|
Recent Comments