Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Category: IT Security

HomeArchive by Category "IT Security"Page 8
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

Charities breached data rules over unencrypted computer thefts

Sheffield-based charity Asperger’s Children and Carers Together (ACCT) and Nottingham-based charity Wheelbase Motor Project both breached the Data Protection Act by failing to encrypt computers that contained sensitive information relating to young people, the Information Commissioner’s Office (ICO) said today.

Both incidents occurred when the devices were stolen.  Asperger’s Children and Carers Together reported the breach after an unencrypted laptop, containing personal data relating to 80 children who attended its sessions, was stolen from an employee’s home in December last year.

The laptop was being used to store medication information as well as children’s names, addresses and dates of birth.

Wheelbase Motor Project also reported the breach after the theft of an unencrypted hard drive from the charity’s offices. The device contained personal information relating to 50 young people and included some details about past criminal convictions and child protection issues.

Acting Head of Enforcement, Sally-Anne Poole said:

“The ICO’s guidance is clear – any organisation that stores personal information on a laptop or other portable devices must make sure that the information is encrypted. Information about young people’s medical conditions or criminal convictions is obviously sensitive and should have been adequately protected.”

stuart.gilbertson
May 27, 2011
0
Share:

The ICO launches UK code of practice on data sharing

A new statutory code of practice designed to help businesses and public sector bodies share people’s personal information appropriately has been published today by the Information Commissioner’s Office (ICO).The ICO’s data sharing code of practice covers both routine and one-off instances of data sharing. It includes good practice advice that will be helpful to all organisations that share personal information – for example when local authorities share information with the health service or when building societies provide information to a credit reference agency. The code gives advice on when and how personal information can be shared as well as how to keep it secure. Along with the full code of practice, the ICO has also published a summary checklist that can be used as a quick reference guide to sharing information. By following the code, organisations should find they have:

  • a better understanding of when, whether, and how personal information should be shared;
  • improved trust and a better relationship with the people whose information they want to share;
  • reduced risk of the inappropriate or insecure sharing of personal data; and
  • minimised risk of breaking the law and consequent enforcement action by the ICO or other regulators.

 

The Data Sharing Code of Practice can be downloaded here

Information Commissioner, Christopher Graham, said:

“The code of practice we’ve issued today offers a best practice approach that can be applied in all sectors. It reflects the constructive comments we received during the consultation period, meaning that we can be confident that it not only makes sense on paper but will also work in the real world too. I’d encourage all businesses and public bodies that share personal data to get to grips with the code without delay so they can be sure they are getting it right.”

The code explains how the Data Protection Act 1998 (DPA) applies to the sharing of personal data. It also provides good practice advice that will be relevant to all organisations that share personal data.

Any data controller who is involved in the sharing of personal data should use the code to help them to understand how to adopt good practice.

stuart.gilbertson
May 14, 2011
0
Share:

PlayStation Network Security Breach

At last, Sony and all involved in running the PlayStation Network have come clean with exactly what has happened with their network.

For the past few days, all access to the Playstation Network and Qriocity services have been unavailable as they turned off the service to investigate what has happened.

3 minutes ago, the user PlayStationEU on twitter announced a link to their latest blog post (here: click!). The blog post states:

we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state/province, zip or postal code), country, email address, birthdate, PlayStation Network/Qriocity passwords and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained. If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained. While there is no evidence that credit card data was taken at this time, we cannot rule out the possibility. If you have provided your credit card data through PlayStation Network or Qriocity, to be on the safe side we are advising you that your credit card number (excluding security code) and expiration date may also have been obtained.

If you have a Playstation and you’ve signed up for the Playstation Network, it may be wise for you to consider changing your password or authentication details if they are the same on other sites or networks.

This is yet another example of the importance of ensuring your passwords are not all the same for every service. If you can use a three-word-phrase instead, use a three-word-phrase. For example, the password “abc123” is nowhere near as secure as “my dog smells”.

stuart.gilbertson
April 26, 2011
0
Share:

School in Oldham loses unencrypted Laptop: breaches Data Protection Act

A School in Oldham has breached the Data Protection Act after the theft of an unencrypted laptop from a teacher’s car, the Information Commissioner’s Office (ICO) said today.

The laptop contained personal information relating to 90 pupils at the school.

The school reported the breach to the ICO in January after an unencrypted laptop was stolen from the boot of a teacher’s car when parked at their home overnight. The ICO’s enquiries found that the school was unaware of the need to encrypt portable and mobile storage devices, although it did have a policy in place informing staff that storage devices should not be kept in cars when away from the school premises.

The Head Teacher of Freehold Community School has signed an undertaking to ensure that portable and mobile devices including laptops and other portable media used to store and transmit personal data are encrypted using encryption software which meets the current standard or equivalent.

Staff will also be trained on how to follow the schools policy for the storage and use of personal data and the school has agreed that its policies on data protection and IT security issues will be appropriately and regularly monitored.

The ICO has produced guidance for schools, colleges and other educational institutions explaining their obligations under the Data Protection Act which can be found on the ICO website here.

stuart.gilbertson
April 22, 2011
0
Share:

Lax IT security measures led to NHS data breach in Birmingham

NHS Birmingham East and North breached the Data Protection Act by failing to restrict access to files on their IT network, the Information Commissioner’s Office (ICO) announced today. The breach led to some NHS staff at their own Trust and two other NHS Trusts nearby potentially being able to access restricted information.
NHS Birmingham East and North reported the breach to the ICO in September last year after discovering that electronic files, stored on a shared network, were potentially accessible to their own employees and the employees of two other local Trusts.

The files contained information relating to thousands of individuals, including members of staff. Although health records were not compromised as part of the breach, the files also contained some high level information relating to patients.

The ICO’s investigation has found that, while most of the files were not easily accessible and some security restrictions were in place, file security in general was inadequate.

stuart.gilbertson
April 20, 2011
0
Share:

Cambridgeshire County Council loses unencrypted memory stick

Cambridgeshire County Council breached the Data Protection Act by losing a memory stick containing sensitive data relating to vulnerable adults, the Information Commissioner’s Office (ICO) said today.

The ICO was informed by the council in November 2010 that an employee had recently lost an unencrypted memory stick containing personal data relating to a minimum of six individuals. The information included case notes and minutes of meetings relating to the individuals’ support and was saved on an unapproved memory stick. The device was used to store the information after the member of staff encountered problems using an encrypted memory stick that the council had previously provided free of charge.

Funnily enough, the breach occurred shortly after the council had undertaken an internal campaign aimed at promoting its encryption policy. During this time employees had been asked to hand in unencrypted devices and were warned about the importance of keeping personal information secure.

Mark Lloyd, Chief Executive of Cambridgeshire County Council has signed a formal undertaking to ensure that all portable devices used by the council are encrypted using encryption software that meets the current standard. The council has also agreed to carry out regular monitoring of its data protection policies and IT security measures in order to ensure that they are being followed by all staff.

stuart.gilbertson
February 23, 2011
0
Share:

Ealing Council and Hounslow Council fined by ICO – Unencrypted Laptops

Both Councils Fined

The Information Commissioner’s Office (ICO) today served Earling Council and Hounslow Council with monetary penalties for serious breaches of the Data Protection Act after the loss of two unencrypted laptops containing sensitive personal information.

The two laptops contained details of around 1,700 individuals and was stolen from an employees home. Ealing Council provides an out of hours service on behalf of both councils, which is operated by nine staff who work from home. The team receive contact from a variety of sources and rely on laptops to record information about individuals.
Almost 1,000 records were clients of Ealing Council and almost 700 were clients of Hounslow Council. Both laptops were password protected but were unencrypted.

Ealing Council – FINED £80,000

Hounslow Council – FINED £70,000

The ICO issued Ealing Council with an £80,000 penalty explaining that it breached the Data Protection Act by issuing an unencrypted laptop to a member of staff in breach of its own policies. This method of working has scarily been in place for several years and there were insufficient checks that relevant policies were being followed or understood by staff.
Hounslow Council breached the Data Protection Act by failing to have a written contract in place with Ealing Council. Hounslow failed to also monitor Ealing Council’s procedures for operating the service securely.
Deputy Commissioner, David Smith, said:
“Of the four monetary penalties that we have served so far, three concern the loss of unencrypted laptops. Where personal information is involved, password protection for portable devices is simply not enough.”
Following the incident, both Councils also had to fork out in time and money to notify all individuals affected.
Stuart Gilbertson, Managing Director of Consider IT Limited, said:
“This is the first time two Councils have been fined as part of one case. Both fines reflect the importance of adhering to the Data Protection Act. The fines clearly demonstrate the seriousness of being lackadaisical about your clients data and what consequences there are for when things go wrong. It costs roughly £100 to encrypt a laptop, and not much more to put in proper procedures. Compare that with the £80,000 fine that one Council has received today.”

The monetary penalty served on Ealing Council can be found here (PDF).

The monetary penalty served on Hounslow Council can be found here (PDF).

For more information about ensuring your business complies with the Data Protection Act, have a look at our encryption services page.

stuart.gilbertson
February 8, 2011
0
Share:

Google’s asking for it! $20,000 offered to anyone who can hack Chrome

Every year, CanSecWest security conference hosts a hacking contest (Pwn2Own), this year however, Google got a bit upset.

Most software businesses shudder at the thought of their software being entered into the contest, with the first person to successfully exploit the software winning a considerable wad of cash. Not Google.

Instead, Google asked for their software Chrome, to be included in the conference and even put up a further $20,000 for anyone that could hack it.

Researchers last year said the security sandboxing (that is, the security between the software and the operating system) buttressing the Google browser was so hard to defeat that successful exploits were worth much more than the $10,000 available for each browser hack.

“It shows a mature attitude to the problem because they [Google] know that the actual release of the information is something that just makes the thing stronger,” Dragos Ruiu, organizer of the CanSecWest security conference, said.

stuart.gilbertson
February 3, 2011
0
Share:

Microsoft has issued a “critical” warning over flaw in Windows.

The bug potentially affects every user of the Internet Explorer web browser – around 900 million people worldwide.

In a security advisory, the company warned of a loophole that could be used by malicious hackers to steal private information or hijack computers.

Microsoft has issued a software patch to defend against attacks, and said it was working to develop a long-term fix.

Microsoft admitted that the problem meant users could easily be fooled into downloading malicious files by doing something as simple as clicking on a web link.

“When the user clicked that link, the malicious script would run on the user’s computer for the rest of the current Internet Explorer session,” wrote Microsoft representative Angela Gunn in a website announcement accompanying the advisory.

Once the computer had been hijacked, hackers could use it to steal personal data or send users to fake websites, she added.

The security advisory is available here, 2501696.

The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain conditions for this vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim’s Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user.

All Windows users – particularly those who use Internet Explorer – are being urged to download the fix while the company’s security team develop a way to plug the hole permanently.

For a faster browser experience, why not spend some time playing with Google Chrome?

Want to see just how fast? Look here for a cool video.

stuart.gilbertson
February 1, 2011
0
Share:

80% of people concerned about their personal details online

The Information Commissioner’s Office has revealed in a survey that 80% of people are concerned about protecting their personal information online.

Research commissioned by the ICO has also found that 96% of individuals surveyed are concerned that organisations do not keep their details secure, and a further 60% believe that they have lost control of the way their personal information is collected and processed.

In a move to mark European Data Protection Day, Information Commissioner, Christopher Graham, supported by Lord McNally, Minister of State at the Ministry of Justice, is urging people to take more care on social networking sites, to think before giving out their personal details online, and to understand what to do when things go wrong.

Information Commissioner, Christopher Graham, said:

It’s never been more important to protect your personal information. Whether you’re surfing the net, shopping online or signing up to social networking sites, it’s crucial that people are thinking about how their information might be used.
From employers looking up potential employees on Facebook to cyber criminals hacking into unsecured wifi networks, not protecting your personal information can cause serious harm and distress. European Data Protection Day is about motivating people to regain control of their right to privacy. I hope people of all ages across the UK will do just that.

A personal information toolkit is available on the ICO website here:
Personal Information Toolkit

stuart.gilbertson
February 1, 2011
0
Share:
1 … 7 8 9 … 11
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited