I was recently reminded that data privacy is a two-way obligation. Not only must the data supplier (“user”) take steps to take care what data they share with whom the receiving business must take steps to collect personal data responsibly and legally then honour the trust they have been given to keep that data safe […]

Read More

This acticle is also posted on LinkedIn at https://www.linkedin.com/pulse/security-simple-explanation-george-perfect/?trackingId=1IdV0RNtSsiZ0BVP2a0wgQ%3D%3D This article arises out of a post made by David Morton relating a Guardian article that described a major Internet issue that wasn’t (for once) caused by an IT security breach but was nevertheless a good example of what happens when people who don’t understand the […]

Read More

Google acts as judge, jury and executioner after it falsely accuses breach of its “guidelines”

Read More

If you use Windows 10 (why?) you will be familiar with the almost constant succession of disastrous updates and flaws Microsoft pushes out to all users of the operating system. One of the latest to be found is that Microsoft disabled Registry backups in Windows 10 some time around October last year. Apparently Microsoft disabled […]

Read More

Our right to privacy is a fundamental human right enshrined in law in every civilised country on the planet. Yte the governments of those same countries are claiming the right to open every private communication we make – email, text, phone call, video – all in the name of “fighting crime, terrorism, child sex abuse …”. Is this reasonable? Do they – should they have the right to act like this? What are the dangers that arise from them doing so?

Read More

The Electronic Frontier Foundation (EFF) has published a comprehensive, non-technical guide to staying safe and private on-line at https://ssd.eff.org/en including briefings, tool guides to avoid attacks and assist privacy along with advice on such as how to choose a VPN that is right for you. Coming from the EFF the advice is independent and all […]

Read More

In the past few days news has come out that a major flaw inside every computing chip (CPUs or Central Processing Unit) produced by Intel since 2011 contains a major security flaw that would allow hackers to gain access to even the most security-essential data inside your machine (eg; passwords and security certificates you probably […]

Read More

Steps that can and should be taken to improve Internet Security

Read More

Internet Security –Placing responsibility where it belongs

Read More

Internet Security – The impact on users

Read More