Should You Encrypt Email Addresses as in a Database?

Posted on Leave a commentPosted in Business, Cybersecurity

Cyber Security is a serious business these days.  The move to remote working and working from home has exposed many more companies infrastructure to potential malware or hack attacks. Installation and configuration of Cyber Security hardware and software to support the protection of the corporate network and its data during remote access is becoming more […]

How Ignoring Security Risks Leave the Largest Impact on a Business

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

IT security is firmly at the forefront of the Head of IT’s mind.  Hardly a day goes by without a story in the media about data theft, ransomware, or a security exploit. The FBI estimate that malware exploits and general IT-related thefts are significantly on the increase. They attribute it to the increasing use of […]

How to Stop DDoS Attacks Without Damaging Your Own Network

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Online Security is much on the mind of an IT Head nowadays. Malware attacks are increasing in frequency and ferocity. According to the FBI, Ransomware is one of the fastest-growing global industries, and DDoS attacks are often a precursor to a targeted theft of information. There are Online Security software and appliances that can protect […]

Can Mobile Applications Exploit your Online Presence

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

More and more people are using remote services to access corporate and Internet-based services from a remote PC at home, or increasingly from portable smart devices like lap[tops, phones and tablets while on the move.  The trend arises from the increasing numbers of home-based and remote mobile workers needing to contact head office and the […]

6 Security Risks You Should Watch in Remote Desktop Connections

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

The worldwide move to remote working has brought online security concerns to the fore when considering how to secure corporate information held on remote devices. A significant concern is that carriers transfer data over an infrastructure beyond the control of the company.  Responsibility for online security, and ensuring that only authorised users have access to […]

Is Your Cyber Security Funding Enough?

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

The whole Cyber Security world lies heavy on the mind of the head of IT.  Every day brings news of new exploits by hackers, and the board are continually seeking assurances that the company has sufficient protection against digital threats.   In larger organisations, cybersecurity has become a pillar of the corporate governance strategy. There may […]