Gordon Smith

June 12, 2018
A person looking at a screen showing static, signifying security news

Security newsround: June 2018

We round up reporting and research from across the web about the latest security news and developments. This month: help at hand for GDPR laggards, try […]
June 8, 2018

“You have all these silver bullets but not every threat is a werewolf”

Attendees at FutureScope got an insight into how cybersecurity threats have evolved from a technical concern to a business risk. Last week’s business networking conference in […]
June 1, 2018
A speaker's microphone at an event

Upcoming events featuring BH Consulting

Here is a summary of upcoming conferences, events, webinars and training programmes where BH Consulting staff will deliver presentations about issues relating to cybersecurity, data protection, […]
May 25, 2018
Web security browser lock

Here’s how to boost web security after Google HTTPS move

Security professionals will doubtless welcome Google’s decision to mark all HTTP pages as ‘not secure’ from next September onwards. Marketing executives who haven’t kept up to […]
May 17, 2018

Charities guide to better cybersecurity in 10 steps

Charities in Ireland face an increase in cybersecurity threats. Cybercrime incidents are increasing, and no-one is immune. Criminals have the means and the opportunity to target […]
May 14, 2018
Help button for data breach response

Using ISO 27001 to guide your GDPR breach response plan

Among the many changes GDPR will usher in, one of the biggest for many organisations will be mandatory breach reporting. From May 25, all organisations holding […]
May 10, 2018
A person looking at a screen showing static, signifying security news

Security newsround: May 2018

We round up reporting and research from across the web about the latest security news and developments. This month: police success against cyber villains, the value […]
April 24, 2018

10 steps to better security awareness part 2: apply lessons learned

In the first part of this blog, we looked at how to develop an effective simulated phishing test. Now, we’re covering the five steps to ensure […]