Data Protection

How Much Compensation for Breach of Data Protection Act blog image

How Much Compensation for Breach of Data Protection Act?

Your Data Rights and Right to Compensation Under the UK’s data protection law, there are 7 main rights afforded to you. These rights pertain to many aspects of your data sovereignty, including…


what is phishing in computer blog image

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Fundamentals of Information Security Awareness Assuming you have an email account, which in all likelihood you do, it’s basically guaranteed that at some point you’ve received a phishing email.…


what does phishing mean in computer terms blog image

What Does Phishing Mean in Computer Terms?

A Guide to Phishing and Keeping your Information Protected Dear reader, you must click this link ASAP to apply urgent security updates. Sound familiar? Chances are, if you have an email…


How to keep information secure on a computer image by Hut Six Security

How to Keep Information Secure on a Computer - the Easy Way

5 Steps to Stay Secure and Compliant Regardless of whether you’re using your computer for work or personal matters, it’s increasingly incumbent upon you to keep sensitive information safe and…


is information stored in the cloud secure

Is Information Stored in the Cloud Secure?

Is information stored in the cloud secure? It’s fair to say that 2019 was the year that cloud computing went mainstream, though despite many businesses willingness to migrate data away from local…


Chrome goes for Gold in Password Security blog image by Hut Six Security

Google Chrome Goes for Gold in Password Security

Google Chrome has now introduced a new feature that alerts users if any of their login credentials have been compromised in a data breach and will recommend when a password change is necessary.…


Windows 10 Security Flaw blog image

NSA Discloses Severe Windows 10 Security Flaw

The United States National Security Agency (NSA) has uncovered and exposed an extremely serious security flaw in Microsoft’s Windows 10 CryptoAPI service. Publicly announced by the intelligence…


Wifi safety blog image

Top 5 WiFi Safety Tips: The Guide to Staying Secure

WiFi Safety tips: The abundance of WiFi networks available to us is obviously massively useful; whether we’re out shopping, commuting or socialising, people are always looking for ways to stay…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


blue with white text certificate transparency blog image

Suspicious Certificates, Transparency and HTTPS

Will Certificate Transparency Help to Rebuild Confidence in Certificate Authorities? With research suggesting an increasing trend towards SSL certified phishing websites (some up to 58%), users…