Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Why Phishing Is Still Your Number One Security Foe
Editorial Why Phishing Is Still Your Number One Security Foe

91% of cyberattacks start with a phishing email . Why are they still so prevalent – and successful? It seems like every day another high-ranking employee falls for a scam and loses millions in company money. How long have security experts been fighting phishing attacks? How much damage can they c

All You Need to Know About the Data Protection Officer
Editorial All You Need to Know About the Data Protection Officer

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements is that public authorities and companies processing per

Beyond Incident Response: Beating the Cyberattack Predictions  of 2017
Editorial Beyond Incident Response: Beating the Cyberattack Predictions of 2017

It would be a severe understatement to say the cyber-landscape has drastically shifted in the past several years. From mere nuisance to real threats on real lives, cyberattacks have grown to be a paramount the issue – and not just for the small-to-medium sized company, but for gigantic c

Broken cyber identity – can damages be repaired?
Editorial Broken cyber identity – can damages be repaired?

What happens to the victims of data theft, once hackers get hold of their identity? We were tempted to say “digital identity”, but that would not have been complete. Once the personally identifiable information (PII) or sensitive personal information (SPI) is in the hands of malicious entities, it c

Is IT alert fatigue one of your concerns?
Editorial Is IT alert fatigue one of your concerns?

Alarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose main activity resides in

Once breached, repeatedly breached – how to stop data loss
Editorial Once breached, repeatedly breached – how to stop data loss

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ specialized services for cyber-security system setting u

Security automation and psychology share risks: the recency bias
Editorial Security automation and psychology share risks: the recency bias

The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this structure determines the prevalence

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network

Stopping online advertising fraud once and for all
Editorial Stopping online advertising fraud once and for all

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, com

Shadow data threat: how to solve a problem you didn’t know you had
Editorial Shadow data threat: how to solve a problem you didn’t know you had

Shadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data meets

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later