• GDPR & Safe Computing at work

    Did you know that 88% of employees lack a basic understanding of safe computer use and that computer use within a business is subject to General Data Protection Regulation (GDPR).

  • Remote Working & Safe Computing

    The majority of businesses now offer remote working to their staff; in fact many employers feel the need to offer this flexibility to attract the correct calibre of prospective employee and it is anticipated that over 50% of all full time workers will work remotely by 2020.

  • The risks and vulnerabilities hidden in plain sight.

    When we think of the ever-increasing threats that target IT infrastructure and the digital information within an internet connected business, we rarely look inwardly to our people to identify existing vulnerabilities and emerging risks.

  • Protecting data and educating users for GDPR

    The new General Data Protection Regulation will significantly change current UK and EU data protection law. The management and security of data within an organisation is no longer a topic that concerns only IT professionals and lawyers. Both senior staff and their information specialists will need to ensure that all business leaders across their organisation understand the risks presented by poorly managed and inadequately secured data, they must also implement effective practices and systems to protect their customers, suppliers and their own business interests.

  • EU GDPR clock ticking

    If your organisation deals with EU residents’ data, you have until 25 May 2018 to comply with the EU’s General Data Protection Regulation (GDPR). While the legislation looks costly, complicated and is drawing ever closer. Your business will be expected to put into place comprehensive but proportionate governance measures & good practice tools. SeccurWatch® is aimed at helping your organisation to identify, manage and tackle the key challenges around responsible computer use. By monitoring computer & user activity SeccurWatch® can protect your organisation from potentially harmful activity.

  • Company Culture is the startpoint for Secure Computing

    50% of the worst IT security breaches in 2015 were caused by users. Computer use is a HUMAN LED process and as such it is extremely difficult to predict how user actions contribute to a security breach. Responsible computer use must be promoted within Business. Users that think before acting present far less risk than those that do not. User Activity Monitoring (UAM) provides an audit trail of all computer activity across your organisation and making users aware their actions are being monitored encourages them to use computers & data responsibly.

  • Self governing Computer Users

    The need for flexible & mobile computing has created a parallel population of self-governing computer users. Agile computing is fantastic for attracting the very best industry talent and delivering a creative work environment but this is not without risk. Autonomous computing demands appropriate security measures; end users are now considered to present the greatest risk to business computing. Deployment of a User Activity Monitoring (UAM) provides your business with the only real solution to ensure your users are practicing responsible computer use.

  • Staff bypass support to solve minor IT issues themselves.

    “Our staff know our computer use policy but they don’t always follow it” You have an AUP that details what is acceptable use of your computer assets & network. Unfortunately, users often solve minor IT problems rather than defer to the IT team. This leads to the practice of users installing their own applications, using personal storage, sharing sensitive data and generally side stepping IT & company acceptable use policies. Recent survey results show 72% of employees admit to using unapproved applications. This is primarily due to the fact that AUPs are trust based & largely unenforced.

  • Computer users are suffering from “Security Fatigue”

    UAM promotes responsible computer use - Computer users are suffering from “Security Fatigue” brought about by incessant cybersecurity warnings, users are now ignoring security messages, exposing their computer systems to potential security threats. By deploying a User Activity Monitoring (UAM) solution you can enforce policies & acceptable use practices as users are aware that their activity is being recorded. SeccurWatch® UAM provides real time security alerts making you aware of risky computer user activity backed up by detailed summary reports that can illustrate the activities of your entire computer workforce

  • Whether external hack or insider breach; the damage is permanent.

    Whether external hack or insider breach; the damage is permanent. The ICO has fined UK Telecoms firm Talk Talk £400,000 today for the theft of private data concerning 157,000 customers. It seems the ICO were particularly critical of the lack of cyber security measures at Talk Talk, commenting “TalkTalk’s failure to implement the most basic cyber security measures allowed hackers to penetrate TalkTalk’s systems with ease, TalkTalk should and could have done more to safeguard its customer information. It did not and we have taken action”.

Page 2 of 2 Previous

Silk Point
Queens Avenue
Cheshire, SK10 2BB

01625 839 705

Seccura Data Intelligence & Security