Please consider updating your browser. Some parts of the website may not function as intended.

The business case for penetration testing – Preaching to the unconverted:

demonstrating statistics

How do you communicate ROI on Penetration Testing to gain buy-in? Did you get your car insurance renewal quote in recently? Chances are it’s gone up and chances are you are wondering whether it’s worth it. For non-tech savvy finance folk and to be fair, some tech-savvy non-finance folk, you can understand why they might […]

You sank my YouTube Channel!

‘Massive’ YouTube content creator hack confirmed – 23 million influencers and creators could be affected. If you, like me have memories of just three TV channels, recording the Top 40 on your cassette player and of course the board game Battleship then the phrase social media influencer may have you scratching your head, set your teeth on edge or something in-between.  It turns out […]

IoT Home “security” cameras: Are you having a laugh!?

IoT Home Security Cameras Amazon Ring

The Amazon Ring Tale “Update: 29/01/2020: so far, when yet more tales of woe (usually regarding the Amazon Ring) come in I have just been adding the stories in the comments section below the original article. However, when an actual Amazon engineer, usually known for their fierce loyalty, sticks their head above the parapet and effectively […]

The British Airways Data Breach “fine”

A fake news parody making fun of the clickbait around the BA and Marriott Group breach fines

Sometimes the truth grows wings and takes flight How UK media reported the ICO’s intention to fine BA & Marriott Hotels and a penetration tester’s view on what BA could of and should of done. Oh, and what’s happened so far with the fine that they actually did issue to Facebook On the 8th July, […]

Why Information Security Awareness Training is Important

a young male using the eRiskology Information Security Awareness elearning portal

Good information security awareness training can turn your workforce into the strongest line of defence instead of the ‘weakest link’.  Around 70 – 80% of all breaches can be attributed to the human element, yet companies often focus their resource of software-based security solutions. Where do we start? If you haven’t already found our post […]

ONE PRIVACY ‘CLUSTERZUCK’ AFTER ANOTHER.

A picture of Mark Zuckerberg with graffiti over it to look like a vampire. He has a bag of blood next to him what has the label "Personal Data"

If some weird decree came into force that dictated you could only write data privacy related blog posts about one company, then the company I would choose, hands down, every time would be Facebook. This time they’ve been caught out storing our passwords in plain text format and they’ve been doing it in the 100s […]

What’s the difference between Information Security and Cyber Security?

“Ah you want the Security Department, this is the Department of Security” I saw a headline the other day, the basic premise of which was suggesting that IT should take full responsibility for cyber security, removing the onus of it from users, thus allowing creatives to be more, well, creative. To be honest, I didn’t […]

Would you trust an MP with your data? [DPA Compliance]

a photograph of the houses of parliament with cartoon speech bubbles saying "you stole my data" "no I didn't" this relates to non DPA compliance in parliament

This week’s missive contains as Ben Elton used to say, “a little bit of politics..” It seems you can’t get away from the deluge of political commentary at present and we apologise if we appear to be adding to the general maelstrom of opinion. It’s not our intention, it’s just that a current political story happens to […]

Data Hack: Was Bezos a Bozo?

Picture of a clown with balloons with text on them that relate to the Bezos hacking events

We doubt it, he probably just needs some awareness training You’ve probably heard about Jeff Bezos’ personal and sensitive media being bandied about by the National Enquirer. No need for us to dwell on that, or comment on the US political machinations that could be behind it. Instead, prompted by an article by Rory Cellan-Jones […]

Don’t Go Chasing Information Security Unicorns

You may have noticed that unicorns are in the news a lot of late. Often, they are referred to in relation to Theresa May’s obviously unachievable Brexit ambitions but these are not the only unicorns in the, erm.. unicorn stable. In fact, they come in many different guises: There are the blockchain unicorns – fantastical […]

Do NOT follow this link or you will be banned from the site!