So you have your own company cybersecurity in order, but what about the people you do business with – and could their attitude impact on your own cyber health?

It’s being reported that some UK businesses are overlooking vulnerabilities in their supply chain.

They may be confident in their own protections, yet some professionals are concerned that the due diligence security audits performed when taking on suppliers are insufficient.

Supply chain hacking is nothing new. Sometimes known as value-chain or third-party attacks, a supply chain attack occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.

Read more ...

IT Nation Picture

With just a month to go until GDPR comes into force, it will hardly come as a surprise that this was one of the hottest topics at IT Nation Europe when it came to London this month (April).

With around 400 managed service providers and IT vendors from across the globe gathering in the capital, it’s the largest conference for companies that sell, service and support technology in Europe.

GDPR has implications for all businesses, but of course is particularly relevant for our own sector.

Read more ...

C SATs April 2018

At Clark IT we like to talk business, not just geek speak.

Yes, we can be nerdy computer buffs like you might find in the IT Crowd, waffling on about data mining, hyperconvergence, blockchain and VR.  And yes, beards and glasses are on trend among the males in our offices.

But when we’re talking with clients, we cut through the tech-talk and jargon and decode it to make it simple to follow and easy to understand.

We realise good communication is essential to understand and be prepared for the fast-paced and ever-changing world of IT.

Read more ...

gdpr infographic

Despite fears that GDPR is rules-heavy and compliance costs could push up the cost of doing business, particularly for smaller firms, it’s right to ensure that consumers should be put in charge of their personal data.

The apparent free-for-all with personal data simply couldn’t go on.

Read more ...

Subcategories

When it comes to passwords and internet security, sometimes the simpler solutions are actually the best.

Let’s take a closer look at how to truly safeguard the information you value most.

Choosing your password

We are often told how essential it is to create numerous complex passwords, and that they should be used uniquely across all our internet applications. The logic behind this decision may seem flawed, but it is rooted in real fears.

However, in practice, having too many passwords can be a terrible headache – not to mention a potential security risk. What if you forget your vital passwords? What if you write them down and misplace the note? What if someone else finds your passwords and accesses your accounts?

Memorising your password

Advice for many years has been to simply memorise your passwords instead of storing them. People have been told that storing passwords in any form is inherently a high-risk activity.

While we encourage the use of password managers (alongside recommendations from the National Cybersecurity Centre (NCSC), interest in this tech has remained low. Yet the recommends a refreshed approach to passwords. Would it work for you?

Three random words

NCSC suggests that established thinking around password creation is flawed, because it expects the end-user (us) to memorise numerous lengthy passwords.

Instead of taking this approach, it may make more sense to instead opt for three ‘random’ words – strong enough to work on many different platforms, and to not be guessed by aspiring hackers – but not so obscure that you can’t remember them, either!


The strategy is informed by real-world customer behaviour, making it a little more grounded and practical in scope.

Key areas to consider with this approach include:

  • Length of passwords – this will likely be much longer than single-word passwords.
  • Impact of passwords – the technique needs to be implemented across multiple different platforms to work most efficiently.
  • Novelty of passwords – using three random words can help remove easy guesswork for hackers, making passwords safer and more secure.
  • Usability and user-friendliness – this is a crucial aspect to remember, as it allows for user-error and forgetfulness to be overcome without hindering security protection.

Concerns around three random words

Of course, no password solution is entirely failsafe. There is always the possibility this approach could be seen as weaker than completely randomised password approaches, though the NCSC argues this is not entirely true.

Instead, the randomisation and length of the passwords could in fact be considerably stronger and more targeted than some passwords that are traditionally considered as efficient, but are actually incredibly easy to guess and exploit.

To find out more about the topic, head for the official National Cyber Security Centre website. Get practical help with your cybersecurity by contacting our expert team.