Blog.
10 years of Aristi by its founder, Harj Singh
Written by Harj SinghWhat’s in a name? The word Aristi has three meanings – security, excellence and calm. Find out where we started and where we believe cyber security to be headed.
500 million customers can’t sleep easy with Marriott data breach
Written by Charlotte ThorpThe world’s largest hotel chain, Marriott Hotels, announced on Friday (November 30, 2018) that half a billion of its customers’ data had been breached dating as far back as 2014. Marriott owns more than 5,800 properties around the world with 1.1 million rooms spread across more than 110 countries[. That makes this incident is a […]
The GDPR introduces a duty for you to appoint a data protection officer (DPO) if you are a public authority, or if you carry out certain types of processing activities. To support your on going GDPR compliance and management requirements, we can provide a Virtual Data Protection Officer (vDPO) service giving you access to independent […]
The lack of basic cyber security controls remains a significant factor in the vast majority of cyber attacks in the UK today. Businesses are left worried about hackers, data loss and security, and are not sure where to turn. The scale of the threat is nothing new. The media now regularly covering stories of data […]
There is so much technology and software available these days, preventing malware and malicious emails from getting into our systems that you have to ask are phishing emails still a problem? One of the most used communication technologies is still email due to its versatility and ease of use. However, because of this we now […]
Are you ready for GDPR? The General Data Protection Regulation (GDPR) is a new legal framework that applies in the UK from May 2018. Regardless of Brexit, The UK Government have confirmed that the decision to leave the EU will not affect the commencement of GDPR. If you are currently subject to the UK Data […]
Is your organisation safe from Cyber Attack?
Written by Harj SinghIs your organisation safe from Cyber Attack? Cyber attacks are not a new phenomenon. Malicious hacking attacks on information systems over the Internet have been taking place for many years. The rebranding of these attacks using the word ‘cyber’ has conveniently grouped the various attack types together and brought them to mainstream attention. So what […]
Having good patch management is essential. Patch management is the process of maintaining systems and software updates, encompassing how and when they are kept up to date, change control, testing, prioritisation and in what time frame they are applied. Being able to keep on top of your Microsoft patching as well as other system software […]