As Microsoft ends support for Windows XP today - which means no more official security updates and bug f
Supermarket chain Morrisons had a week to forget when its lacklustre annual results were followed by the appearance on the internet of personal payroll infor
Security giant G4S faces further scrutiny after it emerged a former employee has taken it to court accusing it of “irregular accounting” to play down its profitabi
Reports are coming through of a return of the highly lucrative bogus tax refund scam.
Scammers concocted a convincing replica of an HMRC Employer Bulletin in an increasingly sophisticated approach to phishing for personal information from businesses and accountants.
A big recent conviction showed HMRC making headway against the surge of bogus tax rebate claims that have plagued the self assessment system in recent years.
This is probably the hardest part of the exercise. You have worked out what information you have stored, where it is stored, who has access to it and how it is transmitted.
If you have been following this blog and acting upon the content then by now your organisation will have a good grasp of information assurance.
In my set of blogs on a simple view of Information Assurance I have covered 1 and 2 below in previous posts
In this first blog entry I am going to start with some basics. There is a lot of misinformation around and many debates and forums discussing the ins and outs of various IT security issues.