I was recently reminded that data privacy is a two-way obligation. Not only must the data supplier (“user”) take steps to take care what data they share with whom the receiving business must take steps to collect personal data responsibly and legally then honour the trust they have been given to keep that data safe […]

Read More

This article arises out of a Linkedin post by Alistair McLeod and a comment to that post by my former colleague David Morton. I started to post my own comment but ran up against Linkedin’s length limit before I’d even started! I could write a book on this subject and all its many ramifications so […]

Read More

This acticle is also posted on LinkedIn at https://www.linkedin.com/pulse/security-simple-explanation-george-perfect/?trackingId=1IdV0RNtSsiZ0BVP2a0wgQ%3D%3D This article arises out of a post made by David Morton relating a Guardian article that described a major Internet issue that wasn’t (for once) caused by an IT security breach but was nevertheless a good example of what happens when people who don’t understand the […]

Read More

I believe an email I recently sent to a French business (an ex-pat publication that emailed me to announce a sudden 25% increase in its standard subscription rates) has application and advice applicable to many businesses in the current economic climate. When faced with business downturn, financial woes, lack of funding for growth or any […]

Read More

Why have governments chosen to trash the global economy in order to “escape” a trivial disease?

Read More

Google acts as judge, jury and executioner after it falsely accuses breach of its “guidelines”

Read More

Brexit data blockage is a bigger threat to UK businesses than borders and tariffs combined

Read More
22nd August 2019

Why do businesses lie?

Everyone knows a story or several about the salesman who told a whopper in order to clinch the sale. In my industry (IT) it is sadly still too common to find suppliers promising “features” in software that don’t yet exist – there’s even a name for such features … phantomware. But telling lies is not […]

Read More

Steps that can and should be taken to improve Internet Security

Read More

Internet Security –Placing responsibility where it belongs

Read More