now browsing by tag
Can Big Enterprises Prevent Shadow Data Leakage?
The move to the Cloud by many businesses has forced IT Services to take a good look at how they provide and manage the security of data and Intellectual Property stored offsite. Most technology experts in the IT Service departments of large organisations are acutely aware of the security risksRead More
Bring Your Own Device: Balancing Security and Convenience
The rise of digital convergence has brought significant changes to the IT environment in its wake. There are heavy budgetary pressures on IT to do more with less. All in the backdrop of increasingly virulent and sophisticated malware threats. One potential solution has been for IT to relax its previousRead More
Investing in cyber security for your business, is it worth it?
We read every day about new cyber exploits, large businesses have been hacked and financial information stolen, political parties have their websites defaced, fake news is proliferating, ID theft is seemingly rampant. Our corporate and domestic email inboxes are filled with spammed rubbish. Politicians, corporate board members and individuals ensureRead More
Security risks of ‘Shadow IT’ and how to overcome it
The term ‘Shadow IT’ refers to the use of any digital service, IT systems, or software applications inside an organisation without getting it explicitly approved by the Business Unit IT (BUIT) or without the BUIT’s knowledge. Unauthorised apps and a hosted desktop make it extremely easy for the users toRead More