New Business, November 2010, The importance of backing up your data
Cryptzone, Febuary 2011, Expert: USB keys cannot be overlooked
Cryptzone, Febuary 2011, Gwent Police rapped by ICO for email security blunder
ENCRYPTX, Febuary 2011, ENCRYPTX Announces Addition of Partner Data Defender
Vaultium, March 2011, Data Defender partners with Vaultium to protect client information
Scotsman, May 2011, Sony chiefs bow to inevitable and say sorry for PlayStation hacking
Scotland on Sunday, June 2011, Discord in the shadowy world of cyber terrorism is exposing those accused of online anarchy
Accounting Help, September 2011, Accounting Help September Newsletter
Fresh Business Thinking, October 2011, Businesses closing due to employees' lack of IT security
Microsoft, October 2011, Staff the weak link in IT security
Freelance Advisor, October 2011, Third of SME closures due to human error?
Franchise Focus, October 2011, Data protection and IT security: Are your employees the weak link?
ihotdesk, October 2011, Lack of IT security sends one in three businesses to the wall
ihotdesk, October 2011, 600,000 hackers target Facebook every day
Allaboutrisk, October 2011, Data protection and IT security: Are your employees the weak link?
Silicon Republic, November 2011, China’s cyber armies likely to include social battalions
Comon, November 2011, Moderne spioner bruger sociale netværk
PCR Online, November 2011, Chinese military may be reading your Twitter feed
Kraser, November 2011, Social media has replaced the need for international spy networks
Working Lives, November 2011, Social media poses extra security risks
Business Computing World, November 2011, Social media has replaced the need for international spy networks
Darren Straight's Blog, November 2011, China is likely to have military divisions devoted to sifting through social media
Social Image, November 2011, Spioner bruger da Facebook
Business Computing World, November 2011, NOTW Phone-Hackling Scandal Is Kid’s Stuff
MikroPC, November 2011, Sotilaiden vakoileminen verkossa helpottaa terroristin tihutyötä
Talouselama, November 2011, Facebook ja kumppanit auttavat tiedustelupalveluja - ja terroristeja
Tietoviikko, November 2011, Somessa hölöttävät sotilaat ovat terroristien kultajyviä
Kroll Ontrack, December 2011, Cyber-crime 'will only get worse'
Incahoot, December 2011,
Drive-by downloads 'biggest virus risk'
Kroll Ontrack, December 2011, Drive-by downloads are 'newest malware threat'
Barclay Simpson, December 2011, Security measures need to improve
Microsoft, December 2011, Malware comes from various angles, businesses told
British Standards Institution, December 2011, UK rapid technology adoption 'raises data protection concerns'
Cyber CBI, December 2011, Cyber-crime ‘will only get worse’
Accountancy Age, December 2011, Thinking outside the firewall
Software Utilities, December 2011, Thinking outside the firewall
Barclay Simpson, December 2011, Business applications fail on security
Barclay Simpson, December 2011, Fifth of firms 'not PCI compliant'
ShP, December 2011, Electrical goods ‘must have hard drives wiped before recycling’
ShP, December 2011, Websites ‘are increasingly popular malware methods
Tooway Broadband, December 2011, Websites Internet users 'must be aware of drive-by downloads'
Experian, December 2011, Cyber criminals ‘to adopt new approaches’
Tooway Broadband, December 2011, Internet users 'must be aware of drive-by downloads'
New Media Knowledge (University of Westminster), January 2012, Free IT Security Tips
New Media Knowledge (University of Westminster), January 2012, Data protection and IT security: Are your employees the weak link?
Kroll Ontrack, January 2012, Cloud-based security will become the norm
V3, January 2012, LulzXmas Stratfor hack exposes British defence staff
Computer Weekly, January 2012, Stratfor hacking puts UK, US, Nato officials at risk
Business Computing World, January 2012, Why Don’t Workers Receive Training On IT Security?
Metro, January 2012, Computer hackers reveal plans to send internet into space
Bezpeka, January 2012, Stratfor hacking puts UK, US, Nato officials at risk
IT-Networks, January 2012, LulzXmas Stratfor hack exposes British defence staff
Business Computing World, January 2012, How To Create A Bulletproof Network
Channel 4 News, January 2012, Hackers publish personal data of top UK officials
Association for Financial Professionals, January 2012, AFP Fraudwatch: Stratfor Breach Reveals Greater Weakness
The Data Chain, January 2012, Certified Ethical Hacker's analysis of "Anonymous" breach of Strategic Forecasting Inc
SC Magazine UK, January 2012, What Stratfor said
Acumin Consulting, January 2012, Some things never change: Part two
Dajon Data Management, January 2012, Data protection at stake when companies implement BYOD
Rzeczpospolita, January 2012, Hakerzy, niezależnie od celu, popełniają przestępstwo
Now Ekran, January 2012, Anonymous jest trochę jak al Kaida
Acumin, Febuary 2012, BYOD poses interesting questions
Women In Technology, Febuary 2012, Data engineers could be brought in to encrypt devices
Kroll Ontrack, Febuary 2012, An automated approach to BYOD is wise
Kroll Ontrack, Febuary 2012, BYOD creates a compliance headache
Hostway, Febuary 2012, Businesses must do more for data security
Lorien Resourcing, Febuary 2012, Personal devices are a 'can of worms' for businesses
Barclay Simpson, Febuary 2012, BYOD creates data security issues for firms
CommerceGate, Febuary 2012, Data encryption 'essential across devices'
Kroll Ontrack, Febuary 2012, BYOD creates 'perplexing choices'
Info Security USA, Febuary 2012, Insecure email the culprit of hacked FBI-Scotland Yard call?
Business Computing World, Febuary 2012, Staff Training Is The Only Way To Raise Security Awareness
Kroll Ontrack, Febuary 2012, Data of 1,000 Edinburgh children is lost
ShP, Febuary 2012, Automated approach ‘best for data security on personal devices’
The Data Chain, Febuary 2012, Certified Ethical Hacker's analysis of FBI-UK police call hack
LASA Knowledgebase, Febuary 2012, The bring your own device nightmare
Vertical IT, Febuary 2012, Encryption should be used by companies for BYOD
Business Computing World, Febuary 2012, USB Flash Drives: Will We Ever Learn?
Mitre Finch, Febuary 2012, Letting employees use their own data devices 'opens up a whole can of worms'
The Data Chain, Febuary 2012, Will they ever learn on USB flash drives?
Acumin, Febuary 2012, The new orthodoxy: Bring your own device
IT Reseller, March 2012, Will they ever learn on USB flash drives?
Scotland on Sunday, March 2012, ‘He turned against the very people who trusted him most’ - The story of Sabu, hacker turned FBI informant
ShP, March 2012, Economic pressures threaten data security
Arrow Business Communications, March 2012, Are you ready for the BYOD trend?
BCS, March 2012, RockYou rocked by $250k fine
Dajon, March 2012, Data protection breaches 'can affect company PR and reputation'
BCS, March 2012, Anti-virus not enough, says data expert
Chartered Management Institute, March 2012, 'Embrace data encryption,' says expert
Microsoft, April 2012, Internal IT security defences are crucial
Hostway, April 2012, Data security education is essential in the workplace
Chartered Management Institute, March 2012, Help solve problems with BYOD, says expert
Acumin, March 2012, The major consequences of not protecting data
ihotdesk, March 2012, Most data breaches come from mobile devices
ihotdesk, April 2012, Firms need to preach data security to employees
Acumin, April 2012, 'Lock down' data internally
Chartered Management Institute, April 2012, Employees "don't come with a firewall" says expert
Barclay Simpson, April 2012, Data security education is crucial for company workers
Net Benefit, April 2012, Staff education 'crucial' to data security
Rapid Online, April 2012, Education 'key to protecting IT infrastructure'
Freezone, March 2012, Not protecting data has 'many consequences'
Lorien Resourcing, April 2012, Staff 'need to be fully trained' on data security
Net Benefit, April 2012, Businesses that mishandle personal data 'will lose customers'
British Standards Institution, March 2012, Organizations face range of threats from data protection breaches
Top Up and Go, April 2012, Employees 'must be educated' about data security
Computer Futures, April 2012, IT experts must provide data handling training
New Media Knowledge (University of Westminster), April 2012, Professional hacker three-top-tips to make your network hack proof
Apple Gate, April 2012, Data security: Internal protection important
Net Benefit, April 2012, Firms 'must not be complacent' over PCI
Idea Marketers, April 2012, The importance of protecting your data internally
Data Centre Management, April 2012, Data confidence preparation is essential in a workplace
Commerce Gate, April 2012, 'Many consequences' of not protecting data
ILM, April 2012, Data protection training 'vital for businesses'
Net Benefit, April 2012, Most IT professionals 'do not trust workers'
Free Zone, April 2012, Security plans should be developed to keep online details safe
Net Benefit, April 2012, Firewalls and education 'key to reducing malware risk'
Midland Communications, April 2012, Protecting employees who use their own devices
The Data Chain, May 2012, Web monitoring and blocking will only infuriate LulzSec and similar groups
Huddersfield Exaimer, May 2012, Web forum: Internet column
SC Magazine UK, May 2012, The Pirate Bay hits out at DDoS attacks on ISPs
SC Magazine Australia, May 2012, The Pirate Bay scolds Anonymous for ISP DDoS attacks
Technology Marketing Corporation, May 2012, Pirates at war [Northern Echo (England)]
Free Zone, May 2012, Firms should 'tailor investment' to nullify security threats
Idealware, June 2012, The Bring Your Own Device Nightmare
An Cosantóir, June 2012, Internet Espionage
Just Insurance, July 2012, Small businesses 'are indifferent about data security'
Snowdrop KCS (Sage), July 2012, Data security 'should be priority for small firms'
Chartered Management Institute, July 2012,
The security of data: do smaller firms care?
Biz Space, July 2012,
Employers told that ‘data security measures cannot be ignored’
London Loves Business, July 2012, Big business 'could do more to protect private data'
QBE, July 2012, SME data loss liability warning
Pickmeup, July 2012, Small businesses 'failing to consider security'
Microsoft, July 2012, SMBs need to be more proactive in terms of guarding their confidential data, it has been claimed
Biz Space, July 2012, Technology to combat cybercrime ‘is currently prehistoric’
Tooway Broadband, July 2012, Education is 'crucial' for online data protection
iHotDesk, July 2012, To stop hackers you need to think like one
HostWay, July 2012, Cybercrime makes online world 'like living in the Wild West'
iHotDesk, July 2012, People need to educate themselves on IT security
Net Benefit, July 2012, 'General education' needed to boost data security
Kroll Ontrack, July 2012, Data loss education must improve
Information Age, July 2012, Securing tomorrow's enterprise
Pay Stream, July 2012, Limited company IT security 'ignored'
Indonesia Guard, July 2012, Cybercrime Ancaman Besar dengan Solusi Kecil
Microsoft, July 2012, SMBs cannot be complacent on data security
Vitrium, July 2012, Small businesses not doing enough to protect data, expert claims
Acumin, July 2012, Small businesses don't treat data protection seriously
Acumin, July 2012, Small businesses need to "wake up" to data protection
Absolute Data, July 2012, Small businesses need to “wake up” to data protection
Microsoft, July 2012, SMBs can secure data by taking it offline
Cullum Capital Ventures, July 2012, Small businesses 'need to protect their data'
Vitrium, July 2012, Vermont striving to help small businesses improve document protection
Kroll Ontrack, July 2012, Absolute security means going offline
Future Link Group, July 2012, SMEs have a 'lazy attitude' towards data security
Internet Ink, July 2012, Security Threats For Printers
XLN Telecom, July 2012, Small businesses are ‘apathetic’ towards data security
London Loves Business, August 2012, Small firms urged to act as data security fines hit £1.8m
City AM, February 2013, Don’t get hacked off
Daily Mirror, March 2013, Hacking risk for new cars
Metro, May 2013, Employees ‘clueless on cyber security’
City AM, June 2013, How to keep prying eyes at bay
Daily Mirror, December 2013, NatWest and RBS customers hit by major IT meltdown on Cyber Monday
The Independent, December 2013, Are Huawei the enemy within? GCHQ is tightening its supervision of the giant Chinese telecoms company’s UK headquarters
Daily Mirror, January 2014, Abbey Clancy dressing room raid among BBC thefts totalling more than £500,000 over past 12 months
Unreality TV, January 2014, Strictly Come Dancing winner Abbey Clancy among victims of robberies behind the scenes allegedly to the value of £500,000!
Daily Record, January 2014, Strictly Crooks steal more than half a million pounds worth of gear from BBC stars and staff
Infosecurity Magazine, April 2014, Open-source Bug Leaves Millions of Websites Exposed to Data Leaks
SC Magazine UK, April 2014, Germany's Space Centre 'hacked by cyber spies'
Spam Fighter, April 2014, Sophisticated Cyberattack Targets German Aerospace Center
SC Magazine UK, May 2014, Chip and skim - major card security flaws
Hacker News Bulletin, May 2014, Chip and Skim: Your Credit/Debit cards could be cloned through Pre-Play Flaw
SC Magazine UK, June 2014, Microsoft still hasn't fixed US$100,000 bounty bug
Computer Weekly, July 2014, NatWest lacks basic phishing protection, says security firm Atbash
FS Tech, July 2014, NatWest cybercrime vulnerability highlighted
Dynamoo, July 2014, NatWest fails when it comes to basic phishing precautions - report
PCR Online, July 2014, Security Roundup: NatWest online banking customers at risk of cyber threats
SC Magazine UK, July 2014, 4% of Googlebots are fake and can launch attacks
Education Insider, August 2014, Indian public organisations from local to central government are wide open to email hacking, hacktivism and espionage, says UK email security firm
SC Magazine UK, August 2014, WordPress and Drupal flaw hits 23% of world's websites
SC Magazine UK, August 2014, CISOs offered new way to secure Android devices
SC Magazine UK, September 2014, New APT attack exploits 'dangerous complacency' in Apple users
SC Magazine UK, October 2014, 95% of companies challenged by BYOD security
SC Magazine UK, November 2014, Hackers blackmail Sony film company
SC Magazine UK, December 2014, Poodle bug still hitting 10% of world's websites
SC Magazine UK, January 2015, Google finds 'severe' bug in MS Windows
SC Magazine UK, January 2015, Thunderstrike opens backdoor to Apple Macs
SC Magazine UK, January 2015, Siri voice commands can be used to steal iPhone data
SC Magazine UK, March 2015, 'Rowhammer' hijack via hardware flaw hits half of laptops tested
CCTV News, March 2015, Huawei products and businesses become a common sight in Europe
SC Magazine UK, December 2016, The information security implications of M&A deals
talkRADIO, June 2016, 'Robot uprising? It's miles off', says cybersecurity advisor of Google's kill-switch plans
Guardian, August 2016, The Chinese firm taking threats to UK national security very seriously
This Is Money, January 2017, The best ways to beat nuisance calls: Security expert reveals his tips, as he warns conmen will find a chink in BT's new call-blocking armour
CKGSB Knowledge, March 2017, Good Signals: Huawei Pushes Further Forward
CKGSB Knowledge, March 2017, Beware EU health card salesmen who know all your personal details: Rogue websites charge £35 to apply for EHIC cards - but they're free from the NHS
This Is Money, October 2017, Why you must change your online banking password NOW: 15million personal records revealed to be victims of Equifax hacking