Jim Lythgow, director of strategic alliances at Specsavers Corporate Eyecare, explains the Display Screen Equipment regulations and their implications for public sector organisations:
Continue reading DSE ' one law fits all
KBR Installs Award Winning Wireless Mesh Solution to 18 Towns and Villages throughout NorthumberlandNorthumberland County Council (NCC) prides itself on the range and breadth of services it delivers to the 300,000 people throughout England’s most northerly shire, which covers a vast area from the Tyne and Wear conurbation to the Scottish Borders. Continue reading KBR Installs Award Winning Wireless Mesh Solution to 18 Towns and Villages throughout Northumberland
The Government Communications Headquarters (GCHQ) has announced guidance for public sector technology chiefs to enhance data protection on lost or stolen smartphones. The advice focuses on configuration instructions, secure applications and training for staff members for security procedures on smartphones including iPhones, Windows Phone 7, Nokia and Blackberry devices. Continue reading GCHQ announces smartphone security guidance for public sector workers
European E-commerce Regulations require your clients to provide certain information on your website and to make it easily accessible. There will be new rules about the way you handle cookies soon, too. Watch this space! Continue reading Is your website legal?
Deputy Prime Minister Nick Clegg tells GPSJ that the government is taking cybercrime seriously in 2011. He was speaking to Stuart Littleford on a visit to Oldham in support of Elwyn Watkins for the upcoming by-election. Continue reading Nick Clegg tells GPSJ the government is taking cybercrime very seriously
Siemens IT Solutions and Services has appointed a Head of Government Affairs to champion and develop relationships with central and local Government partners and trade associations. Steven Barker will take this ambassadorial role and lead engagements with public sector working groups concerned with standards in procurement, emergent and changing ICT strategies, plus the identification of innovative products, services and solutions. Continue reading Siemens IT Solutions appointment
There are those who argue that the age of Cloud computing is merely in the minds of the more far-sighted IT visionaries. I have even met those whose businesses are indifferent to the Cloud. This indifference may cost them dearly – and soon. The UK’s new Coalition Government is implementing the -G-Cloud strategy (actually the strategy of the last Government) and there are some who claim that it will save the government £3.2bn from its annual £16bn IT budget of £16bn. That’s not just a big saving for the Government – it’s an obvious opportunity for suppliers who can ensure it is secure. Continue reading Securing your privileged Identity – is anyone in control of Cloud security?
Before we can hope to achieve best practice, we need to address ‘best thinking’ – that is, to assess the patterns of thinking amongst our managers. How managers think will affect the way they manage and interact with their team, ultimately affecting the success or failure of a project or initiative. Continue reading Best thinking drives best practice
With more than 82 per cent of the adult population now having access to the Internet, Tufin Technologies is warning IT managers of the need to prepare for a potential network overload situation as workers use their company IT resources for everything from multimedia greetings to videoconferencing connections to distant colleagues. Continue reading Christmas network overload
The English National Screening Programme for Diabetic Retinopathy (ENSPDR) is working with Quicksilva, an independent provider of software to the private and public sector, and OLM Professional Services, a specialist provider of consultancy services to the health and social care sector, to put in place a framework for automating the sharing of data between GP practices and diabetic retinopathy screening programmes. Continue reading QUICKSILVA AND OLM PROFESSIONAL SERVICES PROVIDE TECH LYNCHPIN FOR NATIONWIDE HEALTH SCREENING PROJECT
Trusteer’s research group has found that 30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism. These findings are based on monitoring of thousands of Phishing attacks. Continue reading According to Trusteer 2FA powerless against Real time phishing attacks
With over 22,000 students, 800 teaching staff and 800 visiting lecturers, the University of Westminster prides itself on the ability to offer the best resources to facilitate learning. Undergraduates make up 75 per cent of students and more than 5,000 are international students from over 150 countries. Westminster is in the top 15 of most popular UK universities for international students and continuing to attract over-seas students is an important business driver for the organisation. Continue reading Improved IT attracts students looking for access to the best resources
London, 18 Oct 2010 – Britain has published it’s National Security Strategy (NSS) which aims to inform thinking and drive policy over coming years. The document categorises threats faced by the nation in tiers highlighting the level of severity, outlines actions to be taken to mitigate such threats and formed the background to the Strategic Defence Review (SDR). Continue reading National security strategy emphasises need for coordinated approach to counter-terrorism
18th October 2010 – Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver in a Cumbria hotel room. And, says Credant Technologies, the endpoint data security specialist, it seems that the USB stick contained details of the nuclear firm’s proposed workforce transfer from its Capenhurst operation in Cheshire to uranium specialist Urenco.one. Continue reading Nuclear secrets revealed after unencrypted USB stick found in Cumbria hotel room
A TEEN who refused to give police officers an encryption password for his computer has been jailed for four months. The case is believed to be the first of its kind in Lancashire. Oliver Drage, 19, formerly of Naze Lane, Freckleton, was arrested in May 2009. Continue reading PASSWORD TEEN JAILED
The ZeuS malware is coming of age and the infections are going to get a lot worse says Trusteer, the secure browsing services specialist. ZeuS malware has already been pushed extensively to users of Web 2.0 and/or social networking sites plus services such as Facebook, Twitter and, most recently, to users of the business social networking site, LinkedIn. Malware is also being modified by cybercriminals using coding toolkits to attack smartphone users. Recent postings by our IT security colleagues at S21sec about ZeuS targeting smartphone users are just the tip of the iceberg when considering the potential of these attacks. Continue reading New Zeus malware attacks Smart phone and LinkedIn users
A simple mistake caused by the recipient auto-complete function within an email client resulted in Gwent Police committing what has been referred to as the first major UK data security breach since the new regulations introduced by the Information Commissioner’s Office came into force in April this year. Continue reading How many police officers does it take to email 10,000 criminal records to a journalist by accident?
What do you get when the worlds leading analysis and data software provider merges with a leading open source intelligence research institute? Hopefully an even more successful business providing data faster and more accurately to its service users. At least that is the outcome i2 CEO Robert Griffin is hoping for as he heralded the group’s newly formed partnership with risk intelligence specialists World Check at its Brussels client conference in June. Continue reading I2 Marriage made in Heaven
|
Recent Comments