Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Social engineering in cyber-attacks – how to protect your company
Editorial Social engineering in cyber-attacks – how to protect your company

In our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? Social engineering i

Multi-factor authentication – is your data protected?
Editorial Multi-factor authentication – is your data protected?

It often occurs in the aftermath of a severe data breach that cyber-security analysts talk about the attacked system as not being secured enough, because it did not use multi-factor authentication. Abbreviated MFA, multi-factor authentication is actually 2FA in most of the cases: two-factor

Safe Harbor Agreement invalidation – what to be prepared for
Editorial Safe Harbor Agreement invalidation – what to be prepared for

The Safe Harbor Agreement is an U.S. – EU agreement between the European Commission and the United States Department of Commerce by virtue of which a Safe Harbor list is open for U.S. organizations. Once businesses meet the conditions and join the list, their European operations are considered co

Doxing – Organizational Level
Editorial Doxing – Organizational Level

Doxing (doxxing) – the word – is a neologism that dates back to the 90s, when Usenet’s members posted personal information on fellow users. It basically represents the idea of compiling and releasing digital documents that lead to identity revelation when posted. “Docx” became “dox”. By the late 200

Software Defined Perimeter -a better, virtual security firewall
Editorial Software Defined Perimeter -a better, virtual security firewall

Software Defined Perimeter (SDP) is a new security approach currently standardized by the #cloud security alliance (#csa). The concept is basically offering an air-gapped network – in a virtual version, so that sensitive data might be secured and companies detaining such data would be better p

The business payment security survival guide
Editorial The business payment security survival guide

A business payment security survival guide is a useful tool for small businesses. Anyone looking to start an online store, or already established businesses trying to countercheck or improve their security procedures could benefit from such information. When outsourcing the payment facility,

Would you trust your digital signage data to the cloud?
Editorial Would you trust your digital signage data to the cloud?

For businesses getting started with digital signage, or which are in the process of improving their deployment, there are two main options. Either the network would be hosted on-premise, or it might be a cloud-based digital signage software. Utilizing Software as a Service (#saas) -based platform

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later