Securitywatch

February 14, 2018
A person looking at a screen showing static

Security newsround: February 2018

We round up reporting and research from across the web about the latest security news. This month: coinjacking for cryptocurrency, CEO fraud takings, Google gets into […]
February 14, 2018
A speaker's microphone at an event

Upcoming events featuring BH Consulting

Here is a summary of upcoming events and webinars where BH Consulting staff will deliver presentations about issues relating to cybersecurity, data protection, and privacy. Each […]
February 13, 2018
Firefighters showing incident response

Prepare for breach: 10 steps to better incident response planning

Developing an incident response plan – and testing various scenarios against it – is now a must. Let’s all remember the Central Bank of Ireland’s stark […]
February 6, 2018

ISP’s Wi-Fi weakness highlights privacy and security shortfalls as GDPR approaches

Having been involved in GDPR preparation work for clients, I’ve become more conscious of how other people and organisations access my data. That brings me to […]
January 16, 2018
Police car strobe light, illustrating a blog post about reporting cybercrime to law enforcement

Reporting for duty: how sharing information helps to tackle cybercrime

In the physical world, people report burglaries to law enforcement all the time. Although some individual crimes may go unsolved because of size or volume, reporting […]
January 9, 2018

Data Protection Implications of Brexit

Well I guess this comes as no big surprise. In its “Notice to stakeholders: withdrawal of the United Kingdom and EU rules in the field of […]
January 9, 2018

Time to see security training as an investment, not a cost

Having finished 2017 with a blog about allocating security spending, we’re starting the new year on a similar note. Specifically, it’s about investing in security awareness […]
January 5, 2018

Meltdown and Spectre vulnerability guidance

On January 3rd 2018, researchers at Google’s Project Zero team announced vulnerabilities, dubbed Spectre and Meltdown, in modern computer processors (CPUs) which could allow an attacker […]