
Media-Insert Communications
The blog of Media-Insert Communications – featuring freelance P.R. and journalism links to the work of Graham A. Jarvis.

Editing, Journalism, Copywriting, and Public Relations
- 3D Printing (2)
- Artificial Intelligence (184)
- Augmented Reality (2)
- Automotive (115)
- Autonomous Vehicles (72)
- Awards (1)
- Banking (49)
- Big Data – IT (140)
- Blockchain (7)
- Business (326)
- Business Continuity (118)
- Business Process Automation (4)
- Call and Contact Centres (18)
- CFO (11)
- Clients, Past and Present (468)
- Cloud computing (175)
- Connected and Autonomous Vehicles (CAVs) (74)
- Connected Cars (97)
- Connectivity (17)
- connectivity (2)
- Connectivity – 5G (11)
- Consumer technology (12)
- Conversational Process Automation (3)
- Crowdfunding (2)
- Cryptocurrencies (2)
- Culture (1)
- Current Affairs (13)
- Customer Service (30)
- Cyber-Security (30)
- Data Acceleration (126)
- Data centre/data center (15)
- Data Management (86)
- Data Protection (59)
- Defence (1)
- Defence technology (1)
- DevOps (2)
- Digital inclusivity (1)
- Digital Transformation (42)
- Disaster Recovery (92)
- Diversity (1)
- E-Commerce (20)
- Economics (9)
- Edge computing (20)
- Education (19)
- Electric Vehicles (17)
- Email Marketing (2)
- Energy and utilities (9)
- Equality (1)
- finance (18)
- Financial Directors (19)
- Financial Services (51)
- Financial Services Technology (21)
- Fintech (24)
- fleet management (3)
- Flexible Working (9)
- Furniture technology (2)
- Further Education (2)
- General Counsel (1)
- Global Treasury (11)
- Government technology (13)
- Green Energy (4)
- Green fleet management (9)
- Green ICE fuels (3)
- H.R. and Recruitment (11)
- Health and Fitness (14)
- Health and Wellbeing (5)
- Healthcare (18)
- Higher Education (7)
- I.T in Human Resources (8)
- Immigrant Integration (1)
- In-house Lawyers (1)
- Industrial Internet (3)
- Information Communications Technology (410)
- Infotainment (4)
- Infrastructure Finance (1)
- Insurance (30)
- Insurance/Reinsurance (23)
- International Relations (10)
- Internet of Things (50)
- Law (8)
- Legal Marketing (4)
- m-Commerce (4)
- Mainframe technology (8)
- Manufacturing technology (1)
- Marketing (37)
- Mobile Marketing (22)
- Mobile Networks (9)
- Mobility (46)
- Music (1)
- New Homes Online (1)
- Open source (1)
- Pensions Technology (1)
- Pharmaceuticals (6)
- Policing (3)
- Politics (11)
- Power Generation (1)
- PR and Media Services (7)
- Project Finance (1)
- Regtech (5)
- Regulations (2)
- Religion (2)
- Remote Working (12)
- robotics (1)
- robots (1)
- Schools (8)
- Science (2)
- SD-WAN (37)
- Self-driving vehicles (110)
- Smart cities (18)
- Software development (2)
- Software standards (2)
- Software-defined (6)
- Sports (1)
- STEM (2)
- Sustainability (2)
- Teaching (15)
- Television (5)
- The Marketing Leaders (10)
- Trading floor (5)
- Travel Technology (11)
- Uncategorized (16)
- Universities (10)
- WAN Acceleration (10)
- WAN Optimisation (137)
- water leak detection (8)
- Web/Tech (449)
- Weblogs (17)
- website accessibility (1)
- Women (1)
- World Finance – Financial Markets (20)
Recent posts
About and Social Media
Category: Cyber-Security
-
In this article for Impact Magazine (page 9), Graham Jarvis looks at “THE TRUE COST OF LAPTOP OWNERSHIP FOR IT AND FINANCE MANAGERS. Bit.ly/2DCNzVL Author: Graham Jarvis.
-
David Trossell, CEO and CTO of data acceleration company Bridgeworks adds: “Many of the electronic systems for cars come from specialist product providers, and many have their own cyber-security penetrating tests and detection mechanisms built into their products.”
-
Many cyber-security techniques focus on securing the perimeter of critical computer systems and on recovering in the event of failure. Yet, there is a role for telematics to play in locking hackers out of connected and autonomous vehicles. David Leporini, director, IoT security in BDS cyber-security products at Atos says that recent history has proven…
-
With WAN data acceleration solutions, large amounts of encrypted data can be rapidly transmitted and received over a wide area network (WAN), while mitigating the effects of latency. They can also reduce packet loss. This means that, even if a trust wishes to use a public cloud for storing patient data, it can rest assured…
-
David Trossell, CEO and CTO of Bridgeworks, is featured in IT Pro Portal‘s guide to ransomware.
-
Stopping hackers Advertisement Hackers must be stopped at the entry points with firewalls, remote user authentication, security audits, user education and by implementing other processes – including regularly data back-ups. Once they are in, they’re in. With the European Union’s General Data Protection Regulations (GDPR), and other data protection initiatives, data should be encrypted at…
-
Graham Jarvis assesses the cyber-security risks of emerging autonomous technology. All the major automakers are currently developing autonomous technologies and solutions for their future autonomous vehicles. These technologies introduce new cyber-security vulnerabilities, and some of which require creative assessment techniques to effectively ensure that they are safe from cyber-attacks that could lead to control of…
-
The role of telematics in locking hackers out of vehicles explored by Graham Jarvis. Many cyber-security techniques focus on securing the perimeter of critical computer systems and on recovering in the event of failure. Yet, there is a role for telematics to play in locking hackers out of connected and autonomous vehicles. David Leporini, director,…
-
Clive Longbottom, Client Services Director at analyst firm Quocirca commented on Facebook: “I’m assuming that should this NHS attack be shown to be down to cost-cutting measures and corner-cutting by the many private companies involved, they will be held responsible for the financial costs involved, and that their management will be held responsible for manslaughter…
-
Skills shortages: David Trossell, CEO and CTO of data acceleration company Bridgeworks, says he’s not surprised by the situation: “It’s not just occurring in the cyber-security world; it’s happening across all sectors in IT at the moment.” He adds that cyber-security is a one against many scenario. “It only takes one hacker to attack thousands…