Optimising IT logo

Tag: Cyber Security

We love blogging about Cyber Security, take a look through the posts below and feel free to comment and share!
Categories
Blog posts
SSD
Cyber Security

Is My Hard Drive Encrypted?

Isn’t it surprising that given the existence of a universally adopted security specification, such a vulnerability makes its way through many disk varieties from different vendors? Here at Optimising IT, we break down the security issues related to hard drive encryption.

Read More »
Supply Chain Risk
Cyber Security

How to Reduce Supply Chain Risk

Optimising IT has carried out over 30 Information Security Reviews for suppliers to our customers this year. As a result, we have made previously unknown and unimagined risks visible to our customers. Our comprehensive Information Security Review highlights the risk areas and offers advice on reducing such risk, giving it real value.

Read More »
Supply Chain Cyber Security
Cyber Security

Is There a Weak Link in Your Supply Chain?

Cyber Essentials should be your minimum threshold for any supplier. Any supplier handling or processing card payments on your behalf should implement the appropriate level of PCI DSS. Our Cyber-security team is helping an increasing number of organisations, by providing independent supplier security reviews and ongoing supplier management using our proven framework.

Read More »
Security Standards
Client Consultancy

Are All Information Security Standards Equal?

Information security standards are good news for many reasons, not least of which I believe is their primary purpose – they offer assurance. The reason they offer assurance is that they have been drafted, reviewed and implemented by very competent, experienced and certified individuals and are recognised in the industry and public sector.

Read More »
GDPR fines for SMEs
Cyber Security

GDPR Fines for Small Businesses

May 2018 saw the European Union adopt a new set of data protection laws called the General Data Protection Regulation — now ominously known as the GDPR. Since its inception, the UK government body responsible for cracking down on GDPR breaches, the Information Commissioner’s Office (ICO), has been busy.

Read More »
Supply chain cyber attacks, data rich organisations beware
Cyber Security

Supply Chain Cyber Attacks

With regulation authorities focusing on operational resilience, it’s never been more important for organisations to demonstrate how quickly they can recover from operational disruption. Even if your business is well protected from Cyber-attacks the same can’t always be said for your suppliers. Discover our top 4 tips for a robust supplier management strategy and how to manage Cyber risk to improve Cyber resilience documented in the Allianz 2020 Business Risk Barometer.

Read More »
Are you underestimating your Shadow IT problem?
Cyber Security

What Is Shadow IT?

What exactly is Shadow IT? Shadow IT is hardware or software that is predominately cloud-based and used by staff without IT’s knowledge, with no testing or approval given by IT or compliance.

Read More »
Computer code on a screen with a skull representing a computer virus / malware attack
Client Consultancy

How the Solorigate Cyber Attack Could Have Been Prevented

The compromise of the Solarwinds Orion monitoring platform is no doubt, one of the most impactful Cyber Attacks ever – not because it caused any disruption or encrypted any data, but because it involved the compromise of software source code from a reputable company and went un-noticed for what is, in cyber terms, a very long time. 

Read More »