United Kingdom
United Kingdom

Time filter

Source Type

Goucher W.,Idrach
Computer Fraud and Security | Year: 2010

My business is about behaviour. It is the way that people go about their business, both in the office and outside it, that makes it difficult to keep sensitive - maybe even embarrassing - information safe. I spend a fair bit of time reading and researching a variety of sources, not all directly to do with security, and also observing the people around me. This means that when I am out and about, whether it's going to the local supermarket or catching a plane to another country - or any amount of movement in between - I am always collecting information. © 2010 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2010

In a recent workshop discussion a delegate explained that, in his experience, one of the key problems with security awareness for ordinary users was that too often they disengaged their common sense when using technology. A quick web surf through sites offering security 'tips for the day' produces a list of practices that would have been unnecessary for most people if they were doing anything other than using computers. © 2010 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2011

Information security is significantly down the list of investment priorities for small and medium enterprises (SMEs). However, the Information Commissioner in the UK said, in a recent address, that businesses of all sizes need to learn to respect data and deal with it in an appropriate way. 1 Yet this requires an appreciation by SMEs of the risk and repercussions of data leakage - and in a way that is meaningful to them. How can this be approached? © 2011 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2011

The situation where travellers or restaurant users find themselves privy to credit card details, business plans and other data is a fairly common experience. You might, for example, simply hear someone giving out their credit card details over a cellphone. There have been a number of presentations given on this phenomenon, and on every occasion at least one member of the audience offers a further example. The initial reason for embarking on research into this issue was to try to understand why this leakage occurs - or, as many people commonly think, 'why people are so stupid'. © 2011 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2011

When PFC Bradley Manning was arrested on suspicion of leaking highly sensitive documents, some were surprised at the information available to a low-level analyst. However, his opportunity came about because he was authorised to use the intranet known as Secret Internet Protocol Router Network, or SIPRNet, which gave him access to huge amounts of data. © 2011 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2011

In the dim and distant past, when the office had, at most, a single computer, the wrath of the manager was visited upon staff for taking home pens and notebooks. In the modern world, business staff can remove a great deal more. The availability of high-capacity storage media and email makes it relatively easy to take sensitive business information away from the office for good operational reasons. However, when there is a threat that staff members might be losing their jobs in the near future, the temptation to get access to information that might help them find a job with a rival, or even set up business for themselves is heightened, as Wendy Goucher discovers. On 15 September 2008, pictures of Lehman Brothers employees leaving the company's New York office, their possessions in boxes, were flashed across news channels of the world. The question many have asked since is, what information did they take with them? How many, sensing the impending collapse, made preparations and gathered data that could help them find future work and influence? © 2011 Elsevier Ltd.


Goucher W.,Idrach
Computer Fraud and Security | Year: 2012

Wendy Goucher from Idrach, shares her views on the weakness of operational incompatibility. A research project was carried out in a public sector organization that handled a significant amount of sensitive data during daily operation to address these issues. The aim of the project was to attempt to understand weakness of operational incompatibility in healthcare services. A number of middle managers were interviewed and a finding emerged that staff expressed their interest to operate in a secure way, but frequently felt challenged by the incompatibility of policy and operational needs.

Loading Idrach collaborators
Loading Idrach collaborators