Post of category Cybersecurity Strategy

Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

Urgent, Important or Both: Setting Priorities in IT Security

The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

Cybersecurity Strategy · Data Security · Internet of Things · Privacy · VPN

How to Keep IoT Devices Secure

Office environments everywhere are being transformed as more and more Internet of Things (IoT) devices enter the workplace. From intelligent air conditioning units and smart lighting to digital...

Cybercrime · Cybersecurity Strategy · Data Security

The Enemy Camped in Your Server

Last week got off to a sensational start with reports of custom chips discovered in Supermicro serverboards that were designed to smuggle malware into companies. Apple, Amazon and dozens of other top...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

If future IIoT security lies at the Edge, then so do VPNs

It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Cybercrime · Cybersecurity Strategy

IT Security Costs Money, no IT Security Costs More Money

British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data...

Blog · Cloud · Cybersecurity Strategy · Data Security

The Cloud Presents New Risks for Financial Services

The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

Friend or Foe: The Importance of Multi-Factor Authentication

The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

Cybercrime · Cybersecurity Strategy · Data Security

Tiny loopholes that can wreak havoc

Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

2 Factor Authentication · Cybersecurity Strategy

Naivety, absurdity or just plain and understandable frustration? Why do we not learn from our mistakes in cybersecurity?

More than half of all users active on the Internet (55%) have been affected by fraud, according to a study by FICO. But this has by no means led to better security precautions and increased awareness....

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK