Category: Advent IM Blog
News and information from the Advent IM team.
The elusive number that represents the real ‘cost of a data breach’ is something that has varied but normally increased in estimation every year. Many large scale data breaches have hit the headlines, but the genuine cost to business has proven hard to nail…. read full article.
Read MoreMike will be guest speaker at this event at York College 11 October 2017. Email businessdevelopment@yorkcollege.ac.uk @York_Col_BDU
Read MorePsychadelic Interiors: Pinterest Sometimes you think you know precisely what technology will bring, change or eradicate. As a child, I remember watching broadcasts from the exhibition stalwart, The Ideal Home Show. Around since 1908, this event has always showcased not only beautiful fixtures, fittings and design, but also technology. This is the part I remember […]
Read MoreThe content from CSP: 2017 is now available, including ours! Slidedecks, articles and audio files are all downloadable here.
Read MoreThanks again to Advent IM Senior Security Consultant, Mark Jones for his expert eye on the changes to the payment card standard. Assumption: Readers already have an understanding of the PCI DSS and/or already compliant with the standard and Requirement 6.4 Change Control Processes. The Issue: Currently, under the PCI DSS v3.2 standard Requirement […]
Read MoreFrom Senior Security Consultant, Mark Jones Assumption: Readers already have an understanding of the PCI DSS and/or already compliant with the standard and Requirement 8.3. The Issue: Currently, under the PCI DSS v3.2 standard Requirement 8.3 Multi-Factor Authentication (MFA) it is only considered ‘best practice’ but from 1st February 2018 it will be […]
Read MoreA post from Steven Foley, Advent IM Security Consultant…and not a moment too soon! 25th May 2018 and The General Data Protection Regulation will come into force bringing greater transparency, enhanced rights for citizens and increased accountability against data holders. This is not new news, it is a fact and has been on the horizon […]
Read MoreMike Gillespie in Computer Weekly – What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence? Read full story.
Read MoreWe have talked about insider threat a lot. It seems that we are destined to talk about it a bit more given the amount of data breach and security failure still being driven by insiders. Bupa was subject to a malicious insider recently. An employee with access and a motivation is hard to stop, not […]
Read MoreWe have talked about phishing before and warned you of the dangers of phishing emails that spread malware, ransomware and other toxic payloads. Today however we are talking fish. Actual fish. It was never going to be long before the obsession with web-enabling everything from air conditioning to kettles, caused a bit of a […]
Read More