• The Secret to Effective Remote Access VPN Management

    Cybercrime · Cybersecurity Strategy · Data Security

    The Enemy Camped in Your Server

    Last week got off to a sensational start with reports of custom chips discovered in Supermicro serverboards that were designed to smuggle malware into companies. Apple, Amazon and dozens of other top...

    Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

    The Prize for Smart Cities is to Secure a Sustainable Future

    At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

    Cybercrime · Endpoint Management

    Security risk through USB cable attacks

    USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

    Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    If future IIoT security lies at the Edge, then so do VPNs

    It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

    Blog · Connected Cars · Data Security

    Software Holds the Key to Connected Car Security

    Software is fast becoming the most important component of the modern car. Already, digital engineering advances that enhance attributes like fuel efficiency, engine management and in-car entertainment...

    Cybercrime · Cybersecurity Strategy

    IT Security Costs Money, no IT Security Costs More Money

    British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data...

    Blog · Cloud · Cybersecurity Strategy · Data Security

    The Cloud Presents New Risks for Financial Services

    The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

    Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

    Friend or Foe: The Importance of Multi-Factor Authentication

    The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

    Cybercrime · Cybersecurity Strategy · Data Security

    Tiny loopholes that can wreak havoc

    Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

    Data Security

    Easing Hospitals' Mobile Data Security Worries

    Mobile communications devices are transforming healthcare services worldwide. Whether helping front line staff to share electronic medical records (EMR), deliver more timely diagnoses through remote...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.