Introduction As can be immediately seen in Figure 1, the IPv6 header is much simpler and makes for a leaner protocol which leads to more efficient processing claims Graziana (2013). Both header versions use the initial version field to state the packet version, ipv4 or ipv6. IPv4s second...
Read MoreThis report investigates and critically discusses the approaches that High Reliability Organisations (HRO) take in managing information security risks within dynamic and fluidic environments. Hopkins states that the term “High Reliability Organisation” (HRO) first seems to have originated in the 1980’s (Hopkins, 2007) and at that time HRO...
Read MoreApologies for not writing for the last 2 months, This summer has been incredibly busy and when your up to your eyeballs some things must take less priority. Its been really great working this summer with companies such as Viva Vegas in Blackpool, FRP Advisory based all over...
Read MoreIt’s been a real privilege to be a part of the Digital Forensics team investigating Cyber Security, whilst working with the Netherlands National High Tech Crime Unit and the Dutch Payments Association. [caption id="attachment_2779" align="alignnone" width="649"] Working with the Dutch high tech crime unit[/caption]
Read MoreWhat is email encryption and how does Office 365 use it? Encryption is the process by which information is encoded so that only an authorized recipient can decode and consume the information. Office 365 uses encryption in two ways: in the service, and as a customer control. In the...
Read MoreI have been providing computer maintenance contracts for 30 years but of late I have been noticing a distinct decline in requests for year round maintenance contracts. The reasons for this seem manifold:- Clients and employees of those clients are now becoming more IT literate so they are...
Read MoreHolders Sheet Metals manufacture and install ventilation ductwork for many national and local businesses throughout the North West. They had reached that stage, as many companies do, where their peer to peer network was impeding their business efficiency and needed help in moving to a server infrastructure. Cloud9...
Read MoreWith only 4 months left, many of our clients are now well under way with their GDPR Preparations. If your company holds data on individuals then their are 12 steps you should be taking right now ! Awareness You should make sure that decision makers and key people...
Read MoreWe are now based at Blackpool Enterprise Center 291-305 Lytham Road Blackpool Lancs FY4 1EW Our Phone number remains the same at 01253 304255 and our email is enquiries@icloud9.co.uk Cloud9 based at Blackpool Enterprise Centre
Read MoreComputer security Install a firewall and virus-checking on your computers. Make sure that your operating system is set up to receive automatic updates. Protect your computer by downloading the latest patches or security updates, which should cover vulnerabilities. Only allow your staff access to the information they need to...
Read More