• The Secret to Effective Remote Access VPN Management

    2 Factor Authentication · Data Security · Endpoint Management

    The long but right way to two-factor authentication

    It is 2020 and accounts which contain valuable and private data can still be created without two-factor authentication. However, it might be some consolation that this is happening less and less. And...

    Cloud · Cybersecurity Strategy · Data Security · Internet of Things

    Trends for the year ahead

    Another year has passed, and we are already looking forward to 12 months of fresh inspiration for companies and users, and new and exciting trends in information security. Last year, various...

    Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    Smart Cities Need Smart Security

    Through the implementation of smart technology, cities around the world are benefiting from increased efficiency, automation, connectivity, smart transportation, and a more sustainable...

    Cybercrime · Cybersecurity Strategy · Data Security

    Office 365 - The enemy in my inbox

    Just as things don’t always go to plan in practice this is also true of information security. Although the security world are discussing defense strategies involving microsegmentation and artificial...

    Cybercrime · Cybersecurity Strategy · Data Security · Encryption · HIPAA

    Best Practices for Securing Healthcare Data

    The escalation of ransomware and trojan malware combined with the lack of endpoint security caused the healthcare sector to suffer from massive data breaches in 2019. As healthcare organizations rely...

    Cybercrime · Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

    The Worst Data Breaches of 2019

    Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from...

    Cybercrime · Cybersecurity Strategy · Data Security · Encryption

    Online Shopping this Holiday Season? Here's How to Stay Protected

    With the holiday season in full swing, retailers and e-commerce stores are once again competing with the lowest prices and best bargain deals to draw in new customers and increase sales. Nearly 190...

    Cybersecurity Strategy · Data Security · Endpoint Management

    Apple macOS Catalina: Plenty of new features and a spotlight on security

    The current major release of macOS, Catalina was announced recently. As ever with Apple, the list of changes is very long and ranges from using an iPad as a second screen (SideKick) to the...

    Data Security · Encryption · Internet of Things

    Building Trust to Create Smart Cities

    The Internet of Things (IoT) is having a growing impact on helping to make the lives of citizens easier and more efficient. Smart devices have become increasingly common in the average home, from...

    Data Security · Endpoint Management · Internet of Things

    Industrial control systems still at risk

    While security incidents involving ransomware and  data breaches  have have received much media attention, incidents in the industrial control sector rarely make the headlines. We hear so little, you...

    Oops, an error occurred! Code: 202008120955147ceb0ba2

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.