now browsing by tag
Bring Your Own Device: Balancing Security and Convenience
The rise of digital convergence has brought significant changes to the IT environment in its wake. There are heavy budgetary pressures on IT to do more with less. All in the backdrop of increasingly virulent and sophisticated malware threats. One potential solution has been for IT to relax its previousRead More
Investing in cyber security for your business, is it worth it?
We read every day about new cyber exploits, large businesses have been hacked and financial information stolen, political parties have their websites defaced, fake news is proliferating, ID theft is seemingly rampant. Our corporate and domestic email inboxes are filled with spammed rubbish. Politicians, corporate board members and individuals ensureRead More
Security risks of ‘Shadow IT’ and how to overcome it
The term ‘Shadow IT’ refers to the use of any digital service, IT systems, or software applications inside an organisation without getting it explicitly approved by the Business Unit IT (BUIT) or without the BUIT’s knowledge. Unauthorised apps and a hosted desktop make it extremely easy for the users toRead More