A recipe you can trust: baking real consent into cookie notices

Cookie Notices

Anyone who has used the internet since May 2018 must have encountered a growing number of cookie consent notices whenever they browse a website. But are these notices telling us as individuals everything that’s happening with our data? And what should organisations do to make their actions more transparent? The answer to the first question, […]

Irisscon 2019: the human factor as a cybersecurity threat

Cybersecurity threat - IRISSCON

The human factor of cybersecurity, in all its forms, remains one of the industry’s biggest cybersecurity threats. This is judging by the number of times it came up at Irisscon 2019. Marking its tenth anniversary, the Irish cybercrime conference has become a fixture in the events calendar for security professionals.  Since its earliest days, the […]

We are hiring – Cybersecurity Analyst

Cybersecurity Analyst

Due to market growth and continued expansion, BH Consulting is looking to augment its growing team by hiring a new Cybersecurity Analyst. The candidate is passionate about cybersecurity and is keen to demonstrate this. The candidate has at least 3-5 years experience in cybersecurity, and is likely to be currently serving in a similar position. […]

We are Hiring – Senior Cybersecurity Consultant

Senior Cybersecurity Analyst

Due to the continued expansion of our DPO as a Service, and CSO as a Service offerings, BH Consulting is now seeking to recruit a Senior Cybersecurity Consultant to join its growing team. BH Consulting is a dynamic and fast-paced cybersecurity and data protection consulting firm. We provide a market leading range of information security services focused on GDPR, cybersecurity, […]

Security Roundup November 2019

Cybersecurity Trends - Security Roundup

Know when to hold, know when to fold When it comes to ransomware, security consultants and law enforcement have always advised victims not to pay up. That’s understandable, since paying effectively rewards criminals for committing crime. But just as hard cases make for bad law, there are times when organisations have no choice but to […]

Best practice cybersecurity – BSides Belfast keynote 2019

HSE checklist

I had the privilege of delivering the opening keynote address at BSides Belfast 2019. My main goal was to ensure the audience understood the importance of best practice cybersecurity. And the stars all seemed to line up in my favour. The conference was on the last day of October – or cybersecurity awareness month, as […]

Good cybersecurity – top tips and advice

Relevant in tech sector

For European Cybersecurity Month, we have been posting daily tips on our LinkedIn and Twitter feeds. This post rounds up the advice from our October blogs into one post for ease of reference. We hope you find the advice useful. Our first week of tips focused mainly around good cyber hygiene. To clarify, that is […]

How to build a positive cybersecurity culture – Part 2

Positive cybersecurity culture

In part one of this blog, I looked at why positive cybersecurity culture can be more effective and lasting than programmes or time-limited initiatives. At a practical level, I looked at the first three steps to putting that culture in place. It starts with the importance of leading by example and the often unspoken signals […]

How to build a positive cybersecurity culture – Part 1

Good Cybersecurity Culture

Cybersecurity culture in a workplace is positively promoting and embedding safe cybersecurity practices. It’s proactively educating employees on potential cybersecurity threats and on the right behaviour to mitigate such threats going forward. There are lots of good reasons for having a cybersecurity culture within your organisation, here’s two: The risks and threats are now so […]

Security Roundup October 2019

Cybersecurity Trends - Security Roundup

Software bugs: a lot done, more to do The newly published Common Weakness Enumeration CWE Top 25 lists frequent and critical weaknesses that can lead to serious software vulnerabilities. MITRE, the non-profit group that publishes the list, noted that these weaknesses are often easy to find and exploit. “They are dangerous because they will frequently […]