
In this post, we demonstrate how to set up a Hugo-based blog using a custom theme that leverages Tailwind CSS for a modern look. We configured the theme to display hero images for both the site and individual posts, and set up a grid layout for the front page. Images are organized in the assets/images
folder for easy management.

tap tap

Discover how to make delicious no-bake protein balls with rolled oats and protein powder! Perfect for a healthy snack.

Companies and organizations, whether in the public or in the private sector, are re-establishing their business in the era of information and data revolution. Labelled Industry 4.0, businesses are taking advantage of digital technologies like cloud, mobile, and IoT to digitally transform their operations. Even “traditional banks” seek to drive more revenue from digital products, personalized services and experiences. At the same time, financial services organizations need to adapt to a shifting global environment. The COVID-19 pandemic has urged all enterprises to alter their business and security models to support work-from-home practices.

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. How things have changed. In just the past few years (and hundreds of high-profile breaches and £Trillions of economic damage later), cyber threats became impossible for the boardroom to ignore.
Beyond simple economics, the crippling effects of a breach on a business are increasingly broad – from information loss and operational implications, through to media pressure, reputational damage and action from customers or regulators. And so, as the nature of business changed and boards were forced to become increasingly accountable, the idea that issues like encryption are “too technical” for the boardroom transitioned from being an acceptable excuse to a legitimate liability.

…

Super cold run yesterday. Maybe it helped though… I’m sure that wearing my prostatecanceruk shirt helped too

Although it is reported that “very limited” credit and debit card information was accessed in the Wetherspoons breach, it is of no less significant concern that personal details including names and email addresses may have been stolen. In fact, theft of card details is relatively easy to ‘deal with’ – they can be blocked and replaced. It’s the other – seemingly innocuous – information that can pose a bigger problem.

We learned a few weeks ago that master keys for every elevator in New York, from skyscrapers to subways to construction sites, had been copied and leaked, and are now being freely sold online. Let’s hope the image used in that article isn’t of the actual key, else we’ll have an even bigger problem on our hands - thanks to a news piece on baggage handling from last year, replica TSA keys (that open every modern suitcase) have now been 3D printed using leaked photographs of the keys.

Today’s retail POS system looks very different to the Ritty Brothers’ ‘Incorruptible Cashier’of 1870. Now, as the muzzle of even the latest POS system begins to grey, there’s a new pup on the block – mPOS. The common thread throughout all these innovations? The need to ensure that these machines and data are ‘incorruptible’ from a security perspective.
For Ritty, it was as simple as preventing dishonest employees from pocketing money instead of depositing it. With the move to software-based POS terminals, it became much more complex, bringing the need to secure phone lines, and later leased ISDN lines back to the acquirer. The use of hardware-based encryption is recognised by the card schemes as the most practical and secure mechanism to achieve the necessary level of protection. However, the move to increasingly distributed computing is beginning to expose the cracks in protecting the channel, rather than the data itself. We only have to look to Target, Neiman Marcus, or the stores affected by the Chewbacca malware to see the systems under attack and the financial and reputational repercussions of a breach.