Managing Risk

Public sector bodies are notoriously risk averse but seem willing to accept huge amounts of ‘red’ risks in their risk registers, especially relating to technology. When I look at some of these registers, I am left thinking – if this was an airline, would I fly with it? Talking to a group of local authority finance directors about cyber risks, we discussed how they decide what to spend on information

Tagged with: , , , , ,
Posted in Blog

Can we learn from the Rio and Tokyo Olympics?

Every four years the Olympics provides a focus for technological innovation with host cities, competitors and broadcasters all trying to harness the latest innovations to improve performance and get the best from the Games. Rio 2016 has been no exception despite some of the well-publicised difficulties. Google, for example, used use a backpack fitted with 15 sophisticated cameras to gather images for Google Street View in locations only accessible on

Tagged with: ,
Posted in Blog

Are you still relying on Legacy Systems?

The US Department of Defence recently admitted that the Strategic Automated Command and Control System that co-ordinates intercontinental ballistic missiles, nuclear bombers and tanker support aircraft still runs on a 1970s computer system and uses eight-inch floppy disks. This is not cutting edge technology;

Tagged with: , , , , ,
Posted in Blog

Combatting Digital Exclusion

In our connected world it is easy to overlook the estimated 9.5 million people, nearly 20% of the population, who lack the basic online skills needed to send and receive email, use a search engine, browse the internet and complete online forms.  Over 5.1 million people over 65 in the UK have never been online. A typical older internet user saves over £740 a year on household bills thanks to

Tagged with: , , , ,
Posted in Blog

‘Future thinking’ – anticipating and preparing for technological change

Every sixty seconds there are 4.1 million Google searches, 347,000 tweets, 461,000 Facebook logins and 103 hours of YouTube content is uploaded; we are using, consuming and developing technologies at an exponential rate. There was a time when technology was really expensive and only governments could afford to purchase and use the latest gadgets, but those days have long gone.  The consumerisation of technology has made it relatively inexpensive and widely

Tagged with: , , , , ,
Posted in Blog

Government confirms its commitment to cyber with hard cash

The Autumn Statement commits to investing in cyber defences and information security, confirming a near doubling of spending to £1.9 billion over five years. This includes recruiting a further 1,900 specialist staff, establishing a single National Cyber Centre and a series of measures to designed to ensure that the UK has at its disposal the skills, tools and capabilities to defend itself in cyber space.

Tagged with: , , , , , , , , , ,
Posted in Blog

Cyber-crime and daily online life have become very intertwined

Cyber gangs are increasingly targeting governments and healthcare organisations, as well as financial institutions. In our digital age, information is very valuable and public sector organisations are attractive repositories of large personal datasets that can be used to support identity theft and procurement frauds.  Also, information is usually easier to extract than cash. The US Office of Personnel Management, for example, recently revealed two breaches, one affecting 4.2 million individuals

Posted in Blog

Cyber Theft

For most of us ‘bank robbery’ conjures up images of sawn-off shotguns, balaclavas and car chases –   but like most things, crime has gone online and global.  The biggest ever bank robbery, affecting up to 100 banks and resulting in losses of perhaps $1bn (£648m), was recently committed using only computers and cyber know-how. The gang used carefully crafted emails to trick pre-selected employees into opening attachments infected with malicious

Tagged with: , , , , ,
Posted in Blog

What does ‘privacy’ mean in the digital age?

I was talking in London to a senior executive from a high-tech company when she received an email from her new car, which was parked in the US, to say that the pressure in its left front tyre was low.  Increasingly we are living in a world where information is generated automatically, a world of ubiquitous computing, where ‘things’ to talk to ‘things’. This new world, the Internet of Things,

Tagged with: , , , , , , , , , , ,
Posted in Blog

Social media provides powerful communication tools – use them intelligently and safely

Use social media intelligently and safely

Tagged with: , , , , , ,
Posted in Blog
News
  • National Cyber Security Centre begins Operations Read more...
  • NCSC will be operational from October 2016 Read more...
  • Fighting Fraud and Corruption in local government Read more...
  • Details emerging on massive attack on electricity grid Read more...
  • Sophisticated malware that spies on Skype users identified Read more...
Blog