Commissum

Blog


Join Commissum at Securing the Law Firm 2017!



Join Commissum at Securing the Law Firm 2017!

The key event in the UK Legal calendar with a focus on cybersecurity is approaching. Securing the Law Firm takes place at etc.venues St Pauls in London on the 21st September – will you be there?

The Commissum team will be on hand on the day to … |More

Are You Ready for the Cyber-attack Lurking just Around the Corner?



Are You Ready for the Cyber-attack Lurking just Around the Corner?

Failure to prepare is preparing to fail. That adage rings true in so many facets of our lives – the words of my primary school teacher still ring through my head at the sight of them, but she was right enough. It’s a good way to stay … |More

Data Protection in a Security Context



Data Protection in a Security Context


The government announced its plans to write the EU General Data Protection Regulation into UK Law. The requirements of GDPR will be enforced in Britain under the new data protection bill, announced by Matt Hancock, the minister for digital in a statement of intent on 7th August … |More

Dealing with the Global Petya / GoldenEye Ransomware Outbreak



Dealing with the Global Petya / GoldenEye Ransomware Outbreak

On Tuesday, 27th June 2017, news started to emerge from Ukraine that a major cyber-attack had taken hold of systems, including the Ukrainian government’s web services. Supermarkets, public transport, and the Ukrainian central bank all ground to a halt as screens flickered in unison, displaying an email … |More

Be Part of the Conversation – Security BSides Scotland 2017



Be Part of the Conversation – Security BSides Scotland 2017

On Friday 7th April, the Scottish cybersecurity community descends on Edinburgh for BSides Scotland, the first event from the global security community-run franchise to come to our fair shores. Commissum are one of the principle sponsors of this inaugural community gathering and will be on the … |More

Working Without Walls – How to Protect the Data on Your Network Beyond Traditional Perimeters with Software Defined Networks



Working Without Walls – How to Protect the Data on Your Network Beyond Traditional Perimeters with Software Defined Networks

Users have grown to expect instant access to their data, wherever they are. Convenience can facilitate increased productivity, as employees are able to work beyond the traditional boundaries of the workplace. Combine this with the rise of BYOD (Bring Your Own Device) culture, coupled to the assortment … |More

Commissum COO Provides Expert Comment and Analysis on the Investigatory Powers Act with talkRADIO’s Alexis Conran



Commissum COO Provides Expert Comment and Analysis on the Investigatory Powers Act with talkRADIO’s Alexis Conran

Our very own Snoopers Charter expert and COO Jay George was interviewed by Alexis Conran on his weekly show, The Radio Hustle, regarding the recently passed Investigatory Powers Act. The Act was granted royal assent just before Christmas, cementing it in UK law and legitimising state … |More

GDPR vs DPA – How Europe’s New Data Protection Regime is Miles Ahead of Anything We’ve Seen Before



GDPR vs DPA – How Europe’s New Data Protection Regime is Miles Ahead of Anything We’ve Seen Before

We’ve had the Data Protection Act in the UK for a very long time now. The law was passed in 1998, consolidating earlier laws including the previous Data Protection Act 1984 and Access to Personal Files Act 1987, and at the time marked a big step forward … |More

GDPR and You, ‘Kay?



GDPR and You, ‘Kay?

It is little more than three months until March and the touted date for the UK to activate Article 50 to start the formal process of leaving the European Union. Uncertainty still prevails in the whole Brexit debate which is sure to maintain its spot of prominence … |More

Frank’s Financial New Year’s Resolution | Commissum in the Mortgage Finance Gazette & at Mutual Vision’s Cyber Conference



Frank’s Financial New Year’s Resolution | Commissum in the Mortgage Finance Gazette & at Mutual Vision’s Cyber Conference

Once again January has rolled around. With Christmas and New Year already feeling like a distant memory, thoughts turn to the year ahead for many people. 2016 was a busy year in cybersecurity terms, with the rise of ransomware, massive DDoS attacks from the zombified botnet-of-things and … |More