{"id":"", "email":"","default_address":null,"first_name":"","last_name":"","name":"" }
{"domain":"andover-consulting-group.myshopify.com" }

Bitcoin halving - what does it mean for the cryptocurrency?


Bitcoin, the first and leading cryptocurrency in terms of trading volume and market capitalisation, went through its third “halving” on May 11 2020. This major adjustment to how the cryptocurrency operates has only happened twice before and happens every four years.

Read more →

A lack of women in cybersecurity leaves the world at risk


Women are highly underrepresented in the field of cybersecurity. In 2017, women’s share in the U.S. cybersecurity field was 14%, compared to 48% in the general workforce.

The problem is more acute outside the U.S. In 2018, women accounted for 10% of the cybersecurity workforce in the Asia-Pacific region, 9% in Africa, 8% in Latin America, 7% in Europe and 5% in the Middle East.

Read more →

US cybersecurity commission calls for global cooperation


The global commons are under assault in cyberspace. Ransomware attacks, including North Korea’s WannaCry and Russia’s NotPetya, have disrupted vital medical services and global transportation systems, costing billions of dollars. Iran and China have engaged in similar actions.

Read more →

Coronavirus contact tracing poses serious threats to privacy


We are all wondering how COVID-19 will end. We will not likely return to normal without a broadly distributed vaccine, which is a bracing proposition. It is also becoming increasingly clear that we will have to find a way to trace transmission and maybe even enforce individual quarantines in the interim.

Read more →

10 network security considerations when remoting employees

network security Remote Employees VPNs

Corporate network security is a term that describes measures taken to ensure the safety and privacy of company data and information. It encompasses the protection of devices, technologies, processes, locations and employees. Good network security ensures that proprietary data and information is protected physically and digitally from hacking and cyber threats.

Read more →