Cyber Security

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article takes a brief look at what a ‘Zero Trust’ approach is and how it can help. More Complex Security Demands The belief among many IT...

An error in the HM Courts and Tribunals Service computer system meant that 5,000+ defendants were wrongly assigned guilty pleas. Accidental Criminal Convictions The problem that led to 5,000+ people being wrongly given criminal convictions was an error in the computer system’s bulk amendment facility, which was...

Two-Factor-Authentication (2FA) refers to another piece of information that users are required to provide (in addition to username and password login details) to access a website/platform/account. Requiring another piece of information protects against others accessing the account if they simply know the username and password. Reasons The...