Data Protection

what is a phishing text message blog image

What is a Phishing Text Message?

How to Detect, Report and Block Smishing Attacks Just as you’ve likely received your fair share of scam emails, chances are you’ve also received some suspicious text messages. Every year, an…


Insider Threat Sentenced to Two Years blog image

Insider Threat Sentenced to Two Years

A Chinese national has been sentenced to two years in prison for the theft of American owned trade secrets worth a reported $1 billion. A US court found Hongjin Tan, 36, guilty of theft of trade…


Six Business Critical Information Security Tips blog image

6 Business Critical Information Security Tips for SMEs

Regardless of whether you’re part of an international corporation or an up-and-coming SME, information security should be considered an integral part of not only IT, but as critical to management…


business continuity plan blog image

What to Do if you Don’t Have a Business Continuity Plan

Business as Usual? In times of sudden change, be it a natural disaster, electronic failures or global pandemics, having a business continuity plan is essential for an organisation determined to…


Security is no picnic blog image

SME Security is No Picnic

Problem in Chair Not in Computer There are many issues that organisations can encounter when dealing with information security; from lost files and credential sharing, to protecting intellectual…


How does the data protection act protect businesses blog image

How Does the Data Protection Act Affect Businesses?

Rights, Obligations and Important Concepts The UK’s Data Protection Act 2018 was developed not only to significantly update the DPA 1998, and data protections fit for purpose in an increasingly…


How Much Compensation for Breach of Data Protection Act blog image

How Much Compensation for Breach of Data Protection Act?

Your Data Rights and Right to Compensation Under the UK’s data protection law, there are 7 main rights afforded to you. These rights pertain to many aspects of your data sovereignty, including…


what is phishing in computer blog image

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Fundamentals of Information Security Awareness Assuming you have an email account, which in all likelihood you do, it’s basically guaranteed that at some point you’ve received a phishing email.…


what does phishing mean in computer terms blog image

What Does Phishing Mean in Computer Terms?

A Guide to Phishing and Keeping your Information Protected Dear reader, you must click this link ASAP to apply urgent security updates. Sound familiar? Chances are, if you have an email…


How to keep information secure on a computer image by Hut Six Security

How to Keep Information Secure on a Computer - the Easy Way

5 Steps to Stay Secure and Compliant Regardless of whether you’re using your computer for work or personal matters, it’s increasingly incumbent upon you to keep sensitive information safe and…