Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Once breached, repeatedly breached – how to stop data loss
Editorial Once breached, repeatedly breached – how to stop data loss

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ specialized services for cyber-security system setting u

Security automation and psychology share risks: the recency bias
Editorial Security automation and psychology share risks: the recency bias

The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this structure determines the prevalence

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network

Stopping online advertising fraud once and for all
Editorial Stopping online advertising fraud once and for all

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, com

Shadow data threat: how to solve a problem you didn’t know you had
Editorial Shadow data threat: how to solve a problem you didn’t know you had

Shadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data meets

Social engineering in cyber-attacks – how to protect your company
Editorial Social engineering in cyber-attacks – how to protect your company

In our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? Social engineering i

Multi-factor authentication – is your data protected?
Editorial Multi-factor authentication – is your data protected?

It often occurs in the aftermath of a severe data breach that cyber-security analysts talk about the attacked system as not being secured enough, because it did not use multi-factor authentication. Abbreviated MFA, multi-factor authentication is actually 2FA in most of the cases: two-factor

Safe Harbor Agreement invalidation – what to be prepared for
Editorial Safe Harbor Agreement invalidation – what to be prepared for

The Safe Harbor Agreement is an U.S. – EU agreement between the European Commission and the United States Department of Commerce by virtue of which a Safe Harbor list is open for U.S. organizations. Once businesses meet the conditions and join the list, their European operations are considered co

Doxing – Organizational Level
Editorial Doxing – Organizational Level

Doxing (doxxing) – the word – is a neologism that dates back to the 90s, when Usenet’s members posted personal information on fellow users. It basically represents the idea of compiling and releasing digital documents that lead to identity revelation when posted. “Docx” became “dox”. By the late 200

Software Defined Perimeter -a better, virtual security firewall
Editorial Software Defined Perimeter -a better, virtual security firewall

Software Defined Perimeter (SDP) is a new security approach currently standardized by the #cloud security alliance (#csa). The concept is basically offering an air-gapped network – in a virtual version, so that sensitive data might be secured and companies detaining such data would be better p

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later