Google is tracking user locations even after they have opted out; it has emerged.Read more
Take a look around your office. Depending on where you work there could be all manner of potentially dangerous items lying around. The chances are though, you would never have considered the humble office fax machine to be one of them.
Unfortunately, because that view is almost universally shared. They are very rarely protected with the sort of security patches you would apply to your computers, routers and phones. This makes them a holy grail for hackers.Read more
The General Data Protection Regulation or GDPR for short has been in place for two months now and data already shows a declining trend in the insider threat in European Countries.Read more
For those of you that follow the news at all, you will no doubt have heard a lot of stories about Facebook. Unfortunately for the world’s most used social network, very few of these stories could be considered positive. From fake news swaying elections, to the Cambridge Analytica scandal exposing how reckless Facebook can be with our data, there’s been little to shout about over at the social network.Read more
A recently published survey from Cloud Foundry discovered that although the IT industry is more multi-platform than ever the foundations are cloud-native.Read more
The new survey by KPMG discovered that 40% of UK business leaders believed that they would become the target of cyber-criminals.Read more
In their current format it will be impossible for backups and snapshots to comply with the right to be forgotten within GDPR, however systems can be built with compliance in mind.
The right to erasure will also apply to all backups, which in turn would make it impossible to comply with the General Data Protection Regulation (GDPR) as searching for personal data in a backup is very impractical.Read more
On 3/1/2018 (last week) news broke in the media of two security vulnerabilities which will impact almost every computing device in active use today. Named “Spectre” and “Meltdown”, the vulnerabilities arise because of design flaws in CPUs from Intel, AMD, Qualcomm and ARM which have existed for decades – and they’re important because they allow access to information in memory that should be out of reach, whether that’s passwords, keys or other data.Read more
Unsure how to best protect your business against threats. Read our GDPR White Paper for the facts >>
Like it or not, General Data Protection Regulation (GDPR) is coming, and it will affect your business. Make sure your business is ready before the May 2018 deadline.
The EU’s GDPR is coming in May 2018 and it will affect all sorts of organisations in the UK, even despite Brexit. In our last article, we discussed the fines that face businesses that fail to comply with GDPR when it comes into force next year. Based on the size of the figures, it is so important that you ensure your business is ready to comply with GDPR. Being unaware is not an excuse.
To help you out, we at entrustIT have put together this handy guide of five important steps your business can take to get yourself ready for next May.