If you cannot view this email please click here



Hacking Cloud Compliance Reviews



The Computing Security Awards were set up to recognise the solutions and the solution providers that are helping to keep organisations secure. The process to determine the 2017 winners has now begun. Who and what has impressed you most? We invite you now to play your part in these awards by making your nominations.

Editor's Focus

Obsolete software left NHS trusts wide open

The massive cyber attack that crippled the NHS could - and should - have been avoided. Almost all NHS trusts were using an obsolete version of Windows

main headline

banner advert


Nowhere to hide

With email under constant attack, what is the best way to protect your organisation's communications? How do you keep your data vital and easily accessible to you and yours, yet useless to anyone out to access/steal it.

main headline

Prevention: better than any cure

They are vicious and pernicious. So what steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities?

main headline

Mass data breaches eliminated

Panoptex Technologies is a software company out of the U.S. that's making waves by providing an industry first: a massive scale NoSQL database that acts as the last line of defence against mass data breaches by providing encryption in transit, at rest and IN USE.

main headline

Beware the double-edged sword

Encryption plays a vital role in protecting valuable information from being stolen or altered. But it can be used by your enemies just as readily.

main headline

Case Study

Crosskey Gains Complete Security Visibility with AlienVault USM

Crosskey is a Finnish company that develops, delivers and maintains systems and solutions for Nordic banks and capital markets

main headline

Product Review

Acunetix 11

With web sites now under a daily onslaught of attacks, businesses can't afford to be lax about security.

main headline

The Aegis Secure Key 3z from Apricorn

With the EU GDPR (General Data Protection Regulation) active early in 2018, businesses of all sizes must start work on full compliance now.

main headline

Welcome to the June 2017 issue of the Computing Security Newsletter.

We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target.

All the more reason to resist the growing appetites of governments to access web browsing data and metadata on an immense scale. Why? Because, apart from our right to privacy and control over what is essentially ours, such levels of authoritarian control only make everyone’s online activity particularly vulnerable, as it can also be exploited by hackers and fraudsters – or even other governments and their agents. Furthermore, accessing and later sharing this exposed information among government agencies and those collecting the data (ie, UK ISPs) might be a major threat in itself, as private data can be mishandled or intercepted.

NordVPN has long been a vocal critic of increased government surveillance. “Modern democracies should avoid such authoritarian surveillance methods as bulk hacking of thousands of computers, keeping Internet records for years and viewing them without a warrant, or legally obliging ISPs to assist in hacking and decryption,” cautions Marty P. Kamden, CMO of NordVPN.

The World Wide Web’s founder Sir Tim Berners-Lee feels that in many ways the WWW has lived up to the vision of being an open platform “that would allow everyone, everywhere to share information, access opportunities and collaborate across geographic and cultural boundaries.” According to Berners-Lee, people often do not mind when their private data is collected.

But he does add the caveat: “We lose out on the benefits we could realise, if we had direct control over this data, and chose when and with whom to share it.” Also, people are helpless when it comes to “a way of feeding back to companies what data we’d rather not share,” he states. Government surveillance has gone to great lengths, which “creates a chilling effect on free speech”.

Leave something like that unchecked and it becomes the small stone that gathers up ever more private data in its path until it is a giant rock hurtling downhill and totally out of control. Safeguards must be put in place and a line drawn in the sand.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622