Contact Us Today 01642 716680

Data Protection

Are Wireless Networks Secure?

Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key.  How are wireless networks … Read more

When to do Penetration Testing

Regular penetration testing is becoming increasingly important. What many business owners seem to want to know, however, is when to arrange a system test. Any application that processes personal data, whether in the storing or retrieving personal data, needs to have its security tested regularly according to GDPR Article 32 (1.D). Many systems have never … Read more

What is Web Application Security Testing?

Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These vulnerabilities can have wide-reaching consequences to the application as well as the data stored within its database. 

How Dangerous is FaceApp?

Blog art

FaceApp has been getting a huge amount of attention in the media lately for being the hottest new craze that everyone, including celebrities, seems to be using to modify faces in pictures to alter their appearance. Also receiving a great deal of media attention is its seemingly nefarious terms of service that none of us … Read more

GDPR Compliance

Blog art

The General Data Protection Regulation (GDPR) came into effect on the 25th of May 2018 and has already caught out over 200,000 businesses in its first twelve months seeing data breach complaints go up by 160% and fines totalling 56 million euros – 50 million of which was paid by Google alone! Failure to comply … Read more