We use cookies to improve your online experience. Full details about our use of cookies can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.

Allow Cookies
Disallow Cookies

Archive 2012

Research by security software specialists Trend Micro, between February and September 2012, has revealed that the majority (91%) of cyber-attacks ...

"The UK pharmaceutical industry is immensely valuable for this country and the economy", says Martin Smith, Chairman and Founder of the SASIG. The ...

The traditional Christmas shopping rush is underway - using increasingly untraditional methods. As smartphones and other mobile devices are now be ...

From a marketing perspective and to foster good corporate relations, most enlightened organisations agree that employees should use social media t ...

A call-to-action went out at the recent winter SASIG, and it was issued by PwC partner Gill Williams; "It is vital to get the awareness of securit ...

A recent report from PriceWaterhouseCoopers revealed that in the US, just 39% of C-suite executives review security policies annually, compared to ...

The recent survey conducted by Get Safe Online has highlighted that despite all the adverse publicity, people are still taking unnecessary risks o ...

This year has seen a significant increase in the number and severity of data breach fines issued by the Information Commissioner's Office (ICO): d ...

Get Safe Online Week is organised by Get Safe Online, a government initiative which provides unbiased, factual and easy-to-understand information r ...

October 1st - 7th was the UK Action Fraud's National Identity Fraud Prevention Week, the start of a month-long drive highligh ...

Think you're safe using wireless hotspots?  A recent experiment by Sophos found that 27% of nearly 107,000 wireless hotspots in Central London had ...

Inevitably if you set up a system of reporting you get reports, then figures and then a reaction. In the past year there have been 821 reported dat ...

Forget food addiction and the consumption of burgers and full fat coke.  Americans are consuming an average of almost 12 hours of i ...

The hacking of tech-journalist Mat Honan earlier this month proved that strong passwords are no competition to a streetwise social engineer.  Honan ...

Following the Games, we are bathed in the warm glow of success - of the athletes, the volunteers and the armed services; and of LOCOG, whose organi ...

Cyber bullying is nothing new, but it's only in recent years that cases have made the headlines and captured the attention of the public. This type ...

The Insider Threat Masterclass held on 2nd July 2012, discussed the on-going and perhaps still largely unrecognised threat from ' The Insider'. 

Pharmaceutical manufacturers rely on patents as an effective tool to protect intellectual property, probably the most valuable information asset wi ...

This week has seen the release of 'The 6 Types of Social Media Users from www.socialmediatoday.com, an article which provides a fascinating introdu ...

Contrary to popular belief, it appears that people can indeed show restraint when it comes to sharing. Approximately 120,000 members of the public ...

Reports that cold-call companies are breaking the rules in place to protect consumers from unwanted telemarketing calls have revived on-going deba ...

Hitting the headlines this week was the news that thousands of fake Olympic products have been seized at ports and airports throughout the UK by Bo ...

Recent weeks have seen a number of service outages affecting thousands, if not millions, of consumers. NatWest was the first to suffer technical di ...

Cloud computing has quickly developed from something few could fully comprehend to an essential part of our daily routines. Consumer devices have p ...

As the Olympics approaches and organisations implement mobile and home working to avoid traffic congestion in the capital, and London workers brace ...