Keep it safe: Sharing with Surevine. Week 7 Conclusion

And so we reach the last (our seventh) in our series of weekly blogs, all under the title “Keep it safe: Sharing with Surevine”. To recap… In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. In week 2 we took it one step further, and talked … Continued

Keep it safe: Sharing with Surevine. Week 6 Encryption

Welcome our sixth instalment in a series of blogs we are publishing each week, all under the title “Keep it safe: Sharing with Surevine”. In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. In week 2 we took it one step further, and talked about Password … Continued

Keep it safe: Sharing with Surevine. Week 5 Anti-Malware

Welcome our fifth instalment in a series of blogs we are publishing each week, all under the title “Keep it safe: Sharing with Surevine”. In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. In week 2 we took it one step further, and talked about Password … Continued

Keep it safe: Sharing with Surevine. Week 4 – Pins

Welcome to our fourth instalment in a series of blogs we are publishing each week, all under the title “Keep it safe: Sharing with Surevine”. In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. In week 2 we took it one step further, and talked about … Continued

Keep it safe: Sharing with Surevine. Week 3 – Beyond passwords

This is our third instalment in a series of blogs we are publishing each week, all under the title “Keep it safe: Sharing with Surevine”. In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. Last week we took one step further, and talked about Password Complexity. … Continued

Keep it safe: Sharing with Surevine. Week 1 – Password Storage

Surevine don’t exist in a bubble, we need to do business with external companies and people. And to do business, we need to share information that we would quite like to keep between ourselves. While we have a carefully crafted IT policy (and some very clever security folk) to help prevent any leakage of information internally, … Continued