Service Offerings
- Cyber security training
- Product reviews
- Blog or article writing
- Cyber security consulting for SME & HNWI
Chapter Author
Contact Graeme
Journalists, students, potential clients or anyone else, email.......
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
No AI Used Here
Shadow IT during Covid-19: Do not let your employees decide which apps and tools to use
- Details
- Category: Cyber Security (Personal)
Even during the best of times, employees, especially the geekier ones, will use their own geeky SaaS services – some of which the average cybersecurity bod has never heard of, let alone seen before. Since teams are mostly working at home, there is no physical visibility and a reduced virtual monitoring – some people may for instance be doing everything on Office365 email or OneDrive without using a VPN, which is still not ideal. Unregulated use of SaaS services can very quickly mean you lose 100% control of your data as well as storage jurisdictions.
About moi on pre-college: you do not need a degree to get somewhere - thank you Mrs Sloane!
- Details
- Category: My Career Story
Born in the eighties in London, I went to a decent state infant & junior school near my home. Life was good and from an early age I liked to be practical and make or take stuff apart. Typically, I was the youngest in the class which maybe slowed me down a little. Year six ended and it was time to jump into big school, also known as secondary or high school. One funny fact. I was “bribed” as a ten-year-old to go to a non-private secondary school further away. The bribe? A SNES (Super Nintendo Entertainment System) from the extinct Blockbuster store.
My partner is a landscape gardener - who would want to hack me?
- Details
- Category: Cyber Security (Personal)
What is supply-chain security?
In the world of cybersecurity, supply-chain security means that every business, big or small, in an organisation's supply chain must have proper cybersecurity measures in place, otherwise cyber attackers could get to a big organisation via a vulnerability in their supplier network.
Supply-chain security is something we hear about all the time. One famous example of poor supply-chain security is the “Target vendor, Fazio Mechanical, confirms being victim of attack” case where attackers in the Former Soviet Union broke in through a small company specialising in refrigeration and heating, ventilation, and air conditioning (HVAC). According to Nextgov, such supply-chain attacks increased 78% in 2018. So what about the smaller fish? Your employees or the one-man-band who services an estate of a billionaire?
Page 11 of 60
