EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
EGUIDE:
In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
EZINE:
In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
EGUIDE:
In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
EGUIDE:
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
DATA SHEET:
The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
DATA SHEET:
Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
EZINE:
In this week's Computer Weekly, we examine the future of technology in policing as the Home Office announces plans for a new IT organisation. We look at the security risks from employees using publicly available generative AI tools in the workplace. And we hear how Hyatt Hotels is creating a data culture across the organisation. Read the issue now.
EZINE:
In the Netherlands, the average ransomware attack costs firms about €514,000, and these huge sums mean it makes sense that the police invest their time and resources into combating it. One PhD student spent four years embedded in Dutch police cyber teams to conduct research on their efficacy.