Uncategorized

Cyber Security and the General Election

As the 2015 General Election on the 7th of May creeps ever closer, and each party vies for tactical position and an ever bigger slice of the electorate, Templar Executives takes a look into the potential political ramifications within cyberspace. Information Communication Technology (ICT) runs as a common enabling thread through all aspects of government

2017-02-02T18:10:53+01:00By |0 Comments

Can your company withstand a fine of up to €100 million or 5% of your global annual turnover?

The vulnerability of protecting people’s personal data has been highlighted in the news again, after recent allegations emerged that pensioners’ salaries, the value of their investments and the size of their pensions are being sold for as little as 5p to criminals, without the individuals’ consent[1]. The Information Commissioner’s Office (ICO) has launched an investigation,

2017-02-02T18:10:53+01:00By |Comments Off on Can your company withstand a fine of up to €100 million or 5% of your global annual turnover?

The Insider Threat

‘A police detective, a bank robber, and a high-power broker enter high-stakes negotiations after the criminal's brilliant heist spirals into a hostage situation’ - IMDB’s summary of Spike Lee’s ‘Inside Man’ starring Denzel Washington1 . Whilst not as dramatic as Spike Lee’s crime thriller, the actual world of the insider threat is far more common

2017-02-02T18:10:53+01:00By |0 Comments

The Interviews Following ‘The Interview’

We’d like to present you with some of the fascinating background to what happened with the Sony data breaches around “The Interview” film. This blog is in a different style to those we’ve written previously, purely because there has been so much written about this subject already. Read on, you’ll be surprised….  “Good morning and

2017-02-02T18:10:53+01:00By |0 Comments

Your Cyber Security pre-holiday checklist

Are you planning on spending a long weekend away this bank holiday? If so you are probably preoccupied with completing your pre-holiday checklist; asking the neighbour to water your plants and locking the doors and windows – this seems to go without saying. Well what about cleaning up your email inbox, as well as installing

2017-02-02T18:10:54+01:00By |1 Comment

From the Physical World to the Cyber Domain

In the late 1960s the internet was first created, in 1991 the World Wide Web was released and in 2014 most facets of human life are connected to the internet in some way. Anyone working in the security industry will have heard about Cyber Security over the last few years. It has usually been in

2017-02-02T18:10:54+01:00By |0 Comments

Scam Awareness Week: tricks of the trade.

The growth of the internet in the late 1980’s and early 1990’s brought huge opportunities to both organisations and individuals but this growth also signalled a birth of a new type of person; the hacker. Typically your computer hacker in the late 80’s and 90’s hacked into computers to show off with only a small

2017-02-02T18:10:58+01:00By |0 Comments

Are Your Employees Leaving You Open To Cyber Attacks?

  When it comes to better information security, every company needs to invest in its people – starting with the board. Human error (and systems glitches) caused nearly two-thirds of data breaches globally in 2012. The majority of the breaches could have been prevented with a holistic, organisation-wide approach to cyber security. It turns out

2017-02-02T18:10:59+01:00By |0 Comments