Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by stuart.gilbertson

HomeArticles Posted by stuart.gilbertsonPage 10
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

New Peebles Offices

NOTE: CONSIDER IT CONTINUES TO SERVE OUR CLIENTS FROM OUR OFFICES IN EDINBURGH, GLASGOW AND LONDON. WE NO LONGER HAVE OUR OFFICES IN PEEBLES.

 

Consider IT is proud to announce its expansion into the Borders area of Scotland by opening its new Peebles offices.

T: 01721 — —

The offices are located in Peebles’ busy business hub, Cavalry Park, which are ideally suited to serving the Peebles area and the rest of the Scottish Borders.

If you’re in the Peebles or Borders areas and need IT Support, give us a call now: 01721 — — and we’ll be more than happy to help!

Peebles IT Support

 

stuart.gilbertson
February 28, 2011
0
Share:

Cambridgeshire County Council loses unencrypted memory stick

Cambridgeshire County Council breached the Data Protection Act by losing a memory stick containing sensitive data relating to vulnerable adults, the Information Commissioner’s Office (ICO) said today.

The ICO was informed by the council in November 2010 that an employee had recently lost an unencrypted memory stick containing personal data relating to a minimum of six individuals. The information included case notes and minutes of meetings relating to the individuals’ support and was saved on an unapproved memory stick. The device was used to store the information after the member of staff encountered problems using an encrypted memory stick that the council had previously provided free of charge.

Funnily enough, the breach occurred shortly after the council had undertaken an internal campaign aimed at promoting its encryption policy. During this time employees had been asked to hand in unencrypted devices and were warned about the importance of keeping personal information secure.

Mark Lloyd, Chief Executive of Cambridgeshire County Council has signed a formal undertaking to ensure that all portable devices used by the council are encrypted using encryption software that meets the current standard. The council has also agreed to carry out regular monitoring of its data protection policies and IT security measures in order to ensure that they are being followed by all staff.

stuart.gilbertson
February 23, 2011
0
Share:

Ealing Council and Hounslow Council fined by ICO – Unencrypted Laptops

Both Councils Fined

The Information Commissioner’s Office (ICO) today served Earling Council and Hounslow Council with monetary penalties for serious breaches of the Data Protection Act after the loss of two unencrypted laptops containing sensitive personal information.

The two laptops contained details of around 1,700 individuals and was stolen from an employees home. Ealing Council provides an out of hours service on behalf of both councils, which is operated by nine staff who work from home. The team receive contact from a variety of sources and rely on laptops to record information about individuals.
Almost 1,000 records were clients of Ealing Council and almost 700 were clients of Hounslow Council. Both laptops were password protected but were unencrypted.

Ealing Council – FINED £80,000

Hounslow Council – FINED £70,000

The ICO issued Ealing Council with an £80,000 penalty explaining that it breached the Data Protection Act by issuing an unencrypted laptop to a member of staff in breach of its own policies. This method of working has scarily been in place for several years and there were insufficient checks that relevant policies were being followed or understood by staff.
Hounslow Council breached the Data Protection Act by failing to have a written contract in place with Ealing Council. Hounslow failed to also monitor Ealing Council’s procedures for operating the service securely.
Deputy Commissioner, David Smith, said:
“Of the four monetary penalties that we have served so far, three concern the loss of unencrypted laptops. Where personal information is involved, password protection for portable devices is simply not enough.”
Following the incident, both Councils also had to fork out in time and money to notify all individuals affected.
Stuart Gilbertson, Managing Director of Consider IT Limited, said:
“This is the first time two Councils have been fined as part of one case. Both fines reflect the importance of adhering to the Data Protection Act. The fines clearly demonstrate the seriousness of being lackadaisical about your clients data and what consequences there are for when things go wrong. It costs roughly £100 to encrypt a laptop, and not much more to put in proper procedures. Compare that with the £80,000 fine that one Council has received today.”

The monetary penalty served on Ealing Council can be found here (PDF).

The monetary penalty served on Hounslow Council can be found here (PDF).

For more information about ensuring your business complies with the Data Protection Act, have a look at our encryption services page.

stuart.gilbertson
February 8, 2011
0
Share:

Google’s asking for it! $20,000 offered to anyone who can hack Chrome

Every year, CanSecWest security conference hosts a hacking contest (Pwn2Own), this year however, Google got a bit upset.

Most software businesses shudder at the thought of their software being entered into the contest, with the first person to successfully exploit the software winning a considerable wad of cash. Not Google.

Instead, Google asked for their software Chrome, to be included in the conference and even put up a further $20,000 for anyone that could hack it.

Researchers last year said the security sandboxing (that is, the security between the software and the operating system) buttressing the Google browser was so hard to defeat that successful exploits were worth much more than the $10,000 available for each browser hack.

“It shows a mature attitude to the problem because they [Google] know that the actual release of the information is something that just makes the thing stronger,” Dragos Ruiu, organizer of the CanSecWest security conference, said.

stuart.gilbertson
February 3, 2011
0
Share:

Microsoft has issued a “critical” warning over flaw in Windows.

The bug potentially affects every user of the Internet Explorer web browser – around 900 million people worldwide.

In a security advisory, the company warned of a loophole that could be used by malicious hackers to steal private information or hijack computers.

Microsoft has issued a software patch to defend against attacks, and said it was working to develop a long-term fix.

Microsoft admitted that the problem meant users could easily be fooled into downloading malicious files by doing something as simple as clicking on a web link.

“When the user clicked that link, the malicious script would run on the user’s computer for the rest of the current Internet Explorer session,” wrote Microsoft representative Angela Gunn in a website announcement accompanying the advisory.

Once the computer had been hijacked, hackers could use it to steal personal data or send users to fake websites, she added.

The security advisory is available here, 2501696.

The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain conditions for this vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim’s Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user.

All Windows users – particularly those who use Internet Explorer – are being urged to download the fix while the company’s security team develop a way to plug the hole permanently.

For a faster browser experience, why not spend some time playing with Google Chrome?

Want to see just how fast? Look here for a cool video.

stuart.gilbertson
February 1, 2011
0
Share:

80% of people concerned about their personal details online

The Information Commissioner’s Office has revealed in a survey that 80% of people are concerned about protecting their personal information online.

Research commissioned by the ICO has also found that 96% of individuals surveyed are concerned that organisations do not keep their details secure, and a further 60% believe that they have lost control of the way their personal information is collected and processed.

In a move to mark European Data Protection Day, Information Commissioner, Christopher Graham, supported by Lord McNally, Minister of State at the Ministry of Justice, is urging people to take more care on social networking sites, to think before giving out their personal details online, and to understand what to do when things go wrong.

Information Commissioner, Christopher Graham, said:

It’s never been more important to protect your personal information. Whether you’re surfing the net, shopping online or signing up to social networking sites, it’s crucial that people are thinking about how their information might be used.
From employers looking up potential employees on Facebook to cyber criminals hacking into unsecured wifi networks, not protecting your personal information can cause serious harm and distress. European Data Protection Day is about motivating people to regain control of their right to privacy. I hope people of all ages across the UK will do just that.

A personal information toolkit is available on the ICO website here:
Personal Information Toolkit

stuart.gilbertson
February 1, 2011
0
Share:

Mark Zuckerberg’s Facebook fan page hacked


You’d think the head of Facebook would have tip-top security on all his accounts on Facebook, but you’d be wrong.

Mark’s fan page, which has nearly three million ‘likes’, seemingly posted a message calling for Facebook to transform into a ‘social business’.

However, it was neither Mark nor his PR team who posted the status, which was swiftly removed (but not before over a thousand people ‘liked’ it).

While it’s unknown whether the hacker actually did anything more sophisticated than guess the password for Zuckerberg’s fan page, the fact that such a prominent user can be hacked is worrying to all Facebookers.

Facebook has declined to comment thus far; probably busy trying to think up a new password.

Read more: http://www.techradar.com/news/internet/mark-zuckerberg-s-facebook-fan-page-hacked-923992

stuart.gilbertson
January 26, 2011
0
Share:

Natwest Account Maintenance And Verification Procedures

We monitor a lot of spam messages for clients and have noticed a significant increase in the “Phishing” messages coming in pertaining to be from Natwest. These e-mail messages are fake and do not originate from Natwest or any reputable Bank.

The contents of the email read as follows:

Dear NatWest Customer,
National Westminster Bank have been receiving complaints from our customers for unauthorised use of their Natwest Online accounts
Sign In Here For Your Account Verification

The “Sign In Here” section of the e-mail message actually takes you to a clone of the real Natwest login page. When you enter your details on this page, instead of being authenticated with Natwest’s system, your personal details are simply forwarded to the fraudsters.

Whenever you want to log in to your online banking, always type in the address manually, or at least ensure the address in your browsers address bar is correct. A quick check of the address before logging in can save you hours of struggle and potentially financial losses!

stuart.gilbertson
January 21, 2011
0
Share:

UK doctor loses unencrypted laptop

The medic waited 2 weeks before informing his superiors about the theft. The doctor took unencrypted patient information – including names, dates of birth, the treatments – on 1,147 patients and loaded it onto his laptop, which was stolen in November.

Now, Phil Morley, chief executive at Hull and East Yorkshire Hospitals NHS Trust, which runs Hull Royal Infirmary and Castle Hill Hospital in Cottingham, has written to the 1,147 patients affected to apologise.

In the letter, he said: “I am writing this letter to inform you of the incident and also to apologise unreservedly for the loss of your confidential data.
“The doctor acted outside trust and NHS regulations in taking unencrypted patient data away from the trust and installing it on his personal computer.
“I can advise that the trust treats these matters very seriously and the doctor concerned is being managed in accordance with the trust’s policies and procedures.”

The breach is the third incident of personal data exposure to affect Hull residents in less than a year, following an earlier event involving the theft of sensitive data from A4e.

The trust said the doctor informed police the laptop had been stolen following the theft in November but did not notify the trust until two weeks after the incident.

Cathie Holmes, 37, of Beverley, said she was furious when her 12-year-old daughter, Mary, received one of the letters.

Mrs Holmes said: “You can’t send a letter of that magnitude to a child and expect them to understand it.

Sources:-
http://www.theregister.co.uk/2011/01/19/hull_hospital_data_breach_flap/
http://www.thisishullandeastriding.co.uk/news/Undefined-Headline/article-3111119-detail/article.html

stuart.gilbertson
January 19, 2011
0
Share:

Google Chrome RSS Live Links

Last year we moved from the Firefox browser to Google Chrome; and boy is it fast! One thing we have missed though is the ability to subscribe to various RSS feeds to get the latest news and updates from our various favourite websites. In Firefox, we could do this by just clicking on the RSS logo and asking Firefox to dock the feed onto the top navigation bar as shown here:

We really missed this functionality in Chrome, so asked our friend and the guy that actually pushed us to move over to Chrome (Steven McCullagh) if there was a plug-in available to add this feature onto Chrome. Well there is!

RSS Live Links is the plug-in of choice that lets you do almost the exact same things as the default Firefox options let you do. There are however, many more benefits with the RSS Live Links plug-in.
Google Chrome RSS Plug-In

RSS Live Links not only displays your chosen feeds in a neat and tidy way (rather than consuming your entire navigation bar at the top of your browser) but it also offers a plethora of functionality such as opening all unread news feeds, audio notification when a new article is posted, and a ridiculous amount of customisation features that really lets you view your RSS feeds how you want to.

Google Chrome is a web-browser produced and developed by the people at Google. If you’ve not already tried it, and you’re still stuck on a slow clunky browser, why not spend half an hour today giving it a whirl? Google Chrome can be downloaded here.

stuart.gilbertson
January 19, 2011
0
Share:
1 … 9 10 11 … 14
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited