now browsing by tag
How to Choose the Best Password Manager For Your Organisation
In recent years, digital and network-based attacks on systems and data have increased in ferocity and frequency. Businesses have seen increases in ransomware attacks and thefts of Intellectual Property. The theft of user information such as financial and personal data has resulted in an increase in ID theft and misuseRead More
How to be Proactive with the Security of your Business
Many commentators, including the FBI, have noted that the frequency and virulence of malware and other bad actor attacks have increased over the last two years. Ransomware has become a major threat. IT Security, both for home and business networks, has become a major part of any IT Strategy. ItRead More
Can Big Enterprises Prevent Shadow Data Leakage?
The move to the Cloud by many businesses has forced IT Services to take a good look at how they provide and manage the security of data and Intellectual Property stored offsite. Most technology experts in the IT Service departments of large organisations are acutely aware of the security risksRead More
Bring Your Own Device: Balancing Security and Convenience
The rise of digital convergence has brought significant changes to the IT environment in its wake. There are heavy budgetary pressures on IT to do more with less. All in the backdrop of increasingly virulent and sophisticated malware threats. One potential solution has been for IT to relax its previousRead More
Investing in cyber security for your business, is it worth it?
We read every day about new cyber exploits, large businesses have been hacked and financial information stolen, political parties have their websites defaced, fake news is proliferating, ID theft is seemingly rampant. Our corporate and domestic email inboxes are filled with spammed rubbish. Politicians, corporate board members and individuals ensureRead More
Security risks of ‘Shadow IT’ and how to overcome it
The term ‘Shadow IT’ refers to the use of any digital service, IT systems, or software applications inside an organisation without getting it explicitly approved by the Business Unit IT (BUIT) or without the BUIT’s knowledge. Unauthorised apps and a hosted desktop make it extremely easy for the users toRead More