Why Developers Need to be Well Informed About Cyber Security

Why Developers Need to be Well Informed About Cyber Security

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

One of the most critical thoughts in a CIO’s mind these days is Cyber Security. Hardly a day goes by without the media setting out how a major organisation has been hacked, it’s website compromised or information stolen. There are many ways that a corporate network can be secured by using hardware and software solutions. […]

5 Ways to Tell If the Email You Received Is Legitimate or Not

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Most people think that network security revolves around protecting against hacker attacks. Actually, the greatest threat is from your users. One of the most common threats to Email Security is phishing. Phishing is a threat where a thief tries to use email as a means to find out information that can be used to extract […]

Spear Phishing vs Phishing: What's the difference?

Spear Phishing vs Phishing: What’s the difference?

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Cyber Security is continually in the mind of a corporate IT leader.  We read daily of website hacking, information theft, and ID theft.  Businesses have been brought to their knees and sometimes made to fail through hacking attacks and information theft.  Enough to give any business executive grey (or no) hairs. However, concentrating Cyber Security […]

Two Factor Authentication: Is it really a way to protect your security

Two Factor Authentication: Is it really a way to protect your security?

Posted on Leave a commentPosted in Business, Cybersecurity

Online IT Security lies heavily on the minds of all online users today, particularly those executing online financial transactions. IT Security used to rely on a single level of authentication, usually a password or PIN code. As the crooks became more adept at uncovering user credentials through techniques such as phishing and keylogging exploits, it […]

USB Device Connections Could Be a Potential Security Risk

Posted on Leave a commentPosted in Business, Cybersecurity

All IT Security plans are made up of several elements relating to people, processes and hardware and software. They are carefully crafted in the light of a corporate security policy designed to protect, as far as is possible, the organisations systems and intellectual property from internal and external attacks, damage and theft. Each of these […]

How Software Patches Make or Break Your Cyber Security Plan

How Software Patches Make or Break Your Cyber Security Plan

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

You have set up your core and edge cybersecurity procedures.  You have defined policies and procedures to be followed to limit the possibility of malware attacks.  You have a dedicated team monitoring cybersecurity concerns.  You consider that you have done all you can do to achieve comprehensive coverage.  Is that enough? The cybersecurity environment is […]