October 3rd, 2014 / Admin / 0 comments

Oracle brought us in to work on key petrochemical and pharmaceutical accounts to ensure successful implementation of their Information Rights Management document security solution. With over a decade of real world experience in data centric security, we helped the businesses better understand how their security requirements should be addressed. This necessarily involves some significant education and insight to help clients envisage how the technology will be used in practice, highlighting the superlative importance of usability, and helping them to understand some of the potential pitfalls which can result in a poor user experience and therefore low levels of adoption.

Read More...

October 1st, 2014 / Justin Cross / 0 comments

Edward Snowden showed the world what can happen if information is not adequately protected. As an insider to the NSA (National Security Agency) he had access to very sensitive information, and while he was in the organisation that access was necessary. No doubt there would have been solid authentication and access controls in place, but if your trust is misplaced they are no security at all!

Read More...

September 17th, 2014 / Justin Cross / 0 comments

I’m sure you’ve all had them, attachments appearing in your email inbox from various companies, some familiar and some not, which claim to be invoices or order details. They are malicious attachments, some are zip files or pdfs, or other less familiar file types, but they are all attempting to attack your computer through its weakest […]

Read More...