Can Mobile Applications Exploit your Online Presence

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

More and more people are using remote services to access corporate and Internet-based services from a remote PC at home, or increasingly from portable smart devices like lap[tops, phones and tablets while on the move.  The trend arises from the increasing numbers of home-based and remote mobile workers needing to contact head office and the […]

Why Regular IT Vulnerability Testing is Important

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

Network Security is a vital part of the Network Security operation within the IT Security environment. In recent times, malware and other network attacks have increased in frequency and sophistication. In parallel, digital migration has increasingly opened up network access to remote users, both internal and external to the organisation. In the past, IT Security […]

Why Developers Need to be Well Informed About Cyber Security

Why Developers Need to be Well Informed About Cyber Security

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

One of the most critical thoughts in a CIO’s mind these days is Cyber Security. Hardly a day goes by without the media setting out how a major organisation has been hacked, it’s website compromised or information stolen. There are many ways that a corporate network can be secured by using hardware and software solutions. […]

5 Ways to Tell If the Email You Received Is Legitimate or Not

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Most people think that network security revolves around protecting against hacker attacks. Actually, the greatest threat is from your users. One of the most common threats to Email Security is phishing. Phishing is a threat where a thief tries to use email as a means to find out information that can be used to extract […]

Spear Phishing vs Phishing: What's the difference?

Spear Phishing vs Phishing: What’s the difference?

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Cyber Security is continually in the mind of a corporate IT leader.  We read daily of website hacking, information theft, and ID theft.  Businesses have been brought to their knees and sometimes made to fail through hacking attacks and information theft.  Enough to give any business executive grey (or no) hairs. However, concentrating Cyber Security […]

Two Factor Authentication: Is it really a way to protect your security

Two Factor Authentication: Is it really a way to protect your security?

Posted on Leave a commentPosted in Business, Cybersecurity

Online IT Security lies heavily on the minds of all online users today, particularly those executing online financial transactions. IT Security used to rely on a single level of authentication, usually a password or PIN code. As the crooks became more adept at uncovering user credentials through techniques such as phishing and keylogging exploits, it […]