The Sony hack – what’s missing?

sony hackedAmid the gossip, fury and diplomatic activity over the Sony hack a few important points have been overlooked; thousands of employees had their personal information posted online proving that many organisations can’t be trusted to provide security and cyber actions by nation states are here to stay accompanied by ever louder cries of denial.

Read more

Diving into the Deep Web – is your identity protected?

Identity theft deep webThe deep web is a vast resource of information much of it academic and of great value.  However, there is a shadow side, one where stolen identities are offered for sale, among other things. We explore what the deep web means, why it exists and highlight some of the things you need to be aware of for identity theft protection.


Read more

Zeus rules over fake social media

Facebook like Zeus TrojanHackers have turned their attentions to creating false social media ‘likes’ as they follow the money. By revamping an existing virus called Zeus and secretly planting it in thousands of computers there’s a real threat that in time it could also be used to carry out far more damaging actions.

Zeus rules over fake social media

Read more

Texting Privacy: 3 great apps to ensure your text messages stay private

Texting privacyToday, we ask the question that many of you have been curious about – just how private are your text messages?

The good news is that cell phone providers are not mandated to store or keep text messages or phone calls that are sent or received from a cell phone. However, you’re probably more at risk when that text message comes in at the wrong time, whether that’s while you’re on a date, at a meeting or asleep. Typically these aren’t major situations, however what happens when a private message is seen by someone who shouldn’t have seen it?

Read more

A Win for Online Privacy

Win photo copyGood News! The EU Commission has put in place a process for how telecom operators need to handle incidents of online privacy breaches and identity theft. This is a massive step forward in the defence of customer data. The technical measures have been implemented to ensure all victims of customer data breaches receive equal treatment as well as a solid response from the telecom operators responsible for the privacy and safety of that data.

Online Behaviour Part 2: How To Avoid Shady Characters Online

Shady online behavior_blogWith billions using the internet daily, it’s important to remember that everyone’s intent online is different, and may not be in line with yours. People may not be who they say they are. So trusting blindly can get you in trouble, and sharing information can also get you in trouble.

How To Protect Your Mobile Privacy

Mobile privacy_blog72% of mobile users have concerns about their mobile phone privacy. Are you one of them?

 Concerns around mobile phone privacy have risen in the last year. It’s no surprise that the areas of mobile usage that cause the most concerns are shopping, social media, online banking, emailing and not far behind those, mobile apps. Well my goodness – that just about covers everything that you can possibly do on a mobile! So basically, you’re worried about something every time you pick up your phone; now that really can’t be a healthy way to live.

Read more

How Concerned Are You About Your Online Privacy?

Online privacy- part 1_blogRecently, Microsoft released a study which details how we, the public, deal with the intersection of privacy and online life. Participants in the study were HR managers, 2,500 consumers and recruitment professionals in the UK, the US, Germany and France. The results showed that there is still a massive disconnect between people’s fears around privacy and their behavior online, and that education is needed to increase awareness of online privacy security and privacy online.