Grant McGregor Blog
Posts about

encryption

Outlook – Cloudy

Outlook – Cloudy

We recently published an article relating to email and the evolution of cybercrime and another referring to the rising popularity of Microsoft’s Office 365 suite and the growing security risks associated with it.

Read More

GDPR: the aftermath

GDPR: the aftermath

It’s now a little over two months since GDPR came into force. A little longer since those panicked conversations with your boss about what you actually need to do and that inbox full of marketing emails begging you to resubscribe. What have we learnt since then?

Read More

The Beginner’s Guide to Encryption

The Beginner’s Guide to Encryption

With organisations under more pressure than ever to protect their customers’ data, and more and more information being stored digitally, Grant McGregor takes a look at encryption and the possibilities it offers to help small businesses protect their data.

Read More

Best Practice Password Security

Best Practice Password Security

Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch? 

Read More

How to Protect Your Business Against Cyber-Attacks and Data Theft

How to Protect Your Business Against Cyber-Attacks and Data Theft

Wow! Quite a weekend of news around Cyber Security... This was an article we had written a couple of weeks ago now and had scheduled for publication today just for the sake of offering our readers and supported end-users ongoing education about cyber security and playing your part...

Read More

Learning the lessons of 2016: How SMEs can improve their cyber security practices this year

Learning the lessons of 2016: How SMEs can improve their cyber security practices this year

This time last year, we were contemplating 2015 as the year of the data breach. We were taking stock and trying to learn the lessons so that we could better protect ourselves and our businesses from the growing threat of hackers. And then 2016 happened.

Read More

Carphone Warehouse Customer Data Breach

Carphone Warehouse Customer Data Breach

 

Read More

Risky Business – why you shouldn’t store important files locally

Risky Business – why you shouldn’t store important files locally

 

Read More

Microsoft Embraces Inter-operability with the Announcement of SSH Encrypted Login Support for Powershell

Microsoft Embraces Inter-operability with the Announcement of SSH Encrypted Login Support for Powershell

 

Read More

How IT Management Can React To Risks Brought About By Users Connecting Their Own Devices To The Network

How IT Management Can React To Risks Brought About By Users Connecting Their Own Devices To The Network

 

Read More

Categories

see all