Media-Insert Communications

Media-Insert Communications

The blog of Media-Insert Communications – featuring freelance P.R. and journalism links to the work of Graham A. Jarvis.

Editing, Journalism, Copywriting, and Public Relations

Category: Cyber-Security

  • In this article for Impact Magazine (page 9), Graham Jarvis looks at “THE TRUE COST OF LAPTOP OWNERSHIP FOR IT AND FINANCE MANAGERS. Bit.ly/2DCNzVL Author: Graham Jarvis. 

  • David Trossell, CEO and CTO of data acceleration company Bridgeworks adds: “Many of the electronic systems for cars come from specialist product providers, and many have their own cyber-security penetrating tests and detection mechanisms built into their products.”

  • Many cyber-security techniques focus on securing the perimeter of critical computer systems and on recovering in the event of failure. Yet, there is a role for telematics to play in locking hackers out of connected and autonomous vehicles. David Leporini, director, IoT security in BDS cyber-security products at Atos says that recent history has proven…

  • With WAN data acceleration solutions, large amounts of encrypted data can be rapidly transmitted and received over a wide area network (WAN), while mitigating the effects of latency. They can also reduce packet loss. This means that, even if a trust wishes to use a public cloud for storing patient data, it can rest assured…

  • David Trossell, CEO and CTO of Bridgeworks, is featured in IT Pro Portal‘s guide to ransomware.

  • Stopping hackers Advertisement Hackers must be stopped at the entry points with firewalls, remote user authentication, security audits, user education and by implementing other processes – including regularly data back-ups. Once they are in, they’re in. With the European Union’s General Data Protection Regulations (GDPR), and other data protection initiatives, data should be encrypted at…

  • Graham Jarvis assesses the cyber-security risks of emerging autonomous technology. All the major automakers are currently developing autonomous technologies and solutions for their future autonomous vehicles. These technologies introduce new cyber-security vulnerabilities, and some of which require creative assessment techniques to effectively ensure that they are safe from cyber-attacks that could lead to control of…

  • The role of telematics in locking hackers out of vehicles explored by Graham Jarvis. Many cyber-security techniques focus on securing the perimeter of critical computer systems and on recovering in the event of failure. Yet, there is a role for telematics to play in locking hackers out of connected and autonomous vehicles. David Leporini, director,…

  • Clive Longbottom, Client Services Director at analyst firm Quocirca commented on Facebook: “I’m assuming that should this NHS attack be shown to be down to cost-cutting measures and corner-cutting by the many private companies involved, they will be held responsible for the financial costs involved, and that their management will be held responsible for manslaughter…

  • Skills shortages: David Trossell, CEO and CTO of data acceleration company Bridgeworks, says he’s not surprised by the situation: “It’s not just occurring in the cyber-security world; it’s happening across all sectors in IT at the moment.” He adds that cyber-security is a one against many scenario. “It only takes one hacker to attack thousands…