DVANA
Menu

Introduction

DVANA provide critical insight and strategic thinking to our clients. Look through our security articles and see how they can help you. The content from the library will link here.

Recent Articles

UK Parliament Email Hack

2017 Jun 26

A comment on the hack over the weekend on the UK parliament email system and what you can do about it.

Case Study: Security Codebooks

2017 May 22

A case study on how Security Codebooks can be used in a professional services context, with specific application to accountants. Feel free to print and distribute as necessary. (4MB pdf)

WannaCrypt Update

2017 May 14

A summary of the situation and what can be done now and in the future to protect your systems from future attacks.

Bad Passwords of 2016

2017 Feb 02

A quick look at the most common passwords of 2016 and why you should not use them.

Bad Passwords of 2015

2016 Jan 22

A quick look at the most common passwords of 2015 and why you should not use them.

14 Ways to Keep Your Mobile Data Secure

2015 Jan 26

In this article we present 14 different ways that you can keep your mobile data secure. All of them should be utilized at all times as a business and personal necessity.

Keeping Data Safe in the Cloud - Part 2

2015 Jan 19

In part 2, we continue our look into some of the issues which apply to smaller businesses when thinking about deploying into the cloud. In this short article we consider some of the practical solutions.

Keeping Data Safe in the Cloud - Part 1

2015 Jan 12

Smaller businesses in particular have some important issues to consider when thinking about deploying into the cloud. In this short article we consider some of the most pressing.

The Success Cycle

2014 Dec 08

Every business, organization, group or team passes through The Success Cycle. It's only a matter of where in the cycle you are at any one point.

SECCON - Security Condition

2014 Nov 13

SECCON is the security equivalent of a DEFCON. They are used in the event of a data breach to marshal activities and in training to practice.

An Introduction to DUMP - STOP - BAR

2014 Aug 07

This is a security framework which will help businesses with Data Security issues and breaches. Adopt the framework and be in better shape for the future.

Please note, this is a PDF document.

Data Security Levels: A Definition

2014 Jul 12

A White Paper, dealing with the need for Data Security and how to classify the security of data within a business process, ideal for Managers and Executives to understand their processes.

Please note, documents might open in another window.


Please feel free to share this around your social networks.

Would you like a more secure life? Contact us.

We use all manner of tools and techniques to make your work life more secure and safe, to find out how contact us today.