“JAR-GO! is an experienced, industry leading, award winning information-security company that’s in a breed of its own and expanding globally. We provide a range of leading edge solutions, from the bespoke to the holistic that have been recognised with multiple annual rankings and several industry prizes.
We leverage powerful and state-of-the-art technologies to build flexible, reliable, convenient, and secure systems, like military grade encryption, best-of-breed, fully integrated, layered technology that is mature and poised to fill the gaps and weaknesses of other security systems in order to provide our customer’s unified insight and control over web, social, and mobile exposures.”
Naturally, JAR-GO! does not exist. However, the internet is awash with similar statements. In fact, JAR-GO!’s elevator pitch is a collage of some of the worst offenders we’ve come across. Although this kind of fluffy language is nothing new, in the realm of cybersecurity this verbal tick has a particularly nasty effect: it makes security even harder to achieve.
Doing Business Under The GDPR An Overview of the New EU Privacy Regulation
Posted October 31, 2017
In May 25, 2018, the new General Data Protection Regulation (GDPR) will become binding law, affecting thousands of companies inside the EU and around the world. Whilst this law contains many protections for citizens’ privacy, it puts a significant burden on companies to become complaint and threatens harsh fines for any data leaks. Since such a penalty could spell bankruptcy for many small and medium businesses, the law has led to a lot of fear and confusion in the business community. In this blog post, I’ll give a short overview of the most important things that you need to know when it comes to the GDPR.
Your Money or Your Data An Introduction To Ransomware
Posted October 27, 2017
How do you make two ugly concepts worse? Combine them. Ransomware, malware that is installed on devices to extort a ransom from the victim, is becoming ever more popular. These ransoms usually take one of two forms: firstly, there is ransomware such as WannaCry, which encrypts your data, making it unreadable and thus useless. Other ransomware, such as Petya, locks the user out of their system byencrypting key files rather than the whole computer. These key files are necessary to allow the computer to boot, so targeting them makes the computer effectively unusable for the victim.