Is Quantum Computing Really a Cybersecurity Threat?

Posted on Leave a commentPosted in Business, Cybersecurity

One of the lesser-known, but potentially major IT developments recently has been the rise of quantum computing.  Many commentators are looking at it as a potential aid to cybersecurity, while at the same time it poses new threats. Before delving too deeply into quantum computing and cybersecurity, consider a definition of quantum computing. Quantum Computing […]

How Should Startups Get Their Business Succeed in Security

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

One of the effects of the pandemic has been a marked increase in the number of small startup businesses often operated from home.  They are sometimes called “Small Office, Home Office” or SOHO businesses, and need a simple computing infrastructure. The work from home environment is becoming increasingly common. Small startups use their own SOHO […]

How Ignoring Security Risks Leave the Largest Impact on a Business

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

IT security is firmly at the forefront of the Head of IT’s mind.  Hardly a day goes by without a story in the media about data theft, ransomware, or a security exploit. The FBI estimate that malware exploits and general IT-related thefts are significantly on the increase. They attribute it to the increasing use of […]

Can Mobile Applications Exploit your Online Presence

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

More and more people are using remote services to access corporate and Internet-based services from a remote PC at home, or increasingly from portable smart devices like lap[tops, phones and tablets while on the move.  The trend arises from the increasing numbers of home-based and remote mobile workers needing to contact head office and the […]

Why Regular IT Vulnerability Testing is Important

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

Network Security is a vital part of the Network Security operation within the IT Security environment. In recent times, malware and other network attacks have increased in frequency and sophistication. In parallel, digital migration has increasingly opened up network access to remote users, both internal and external to the organisation. In the past, IT Security […]

5 Ways to Tell If the Email You Received Is Legitimate or Not

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Most people think that network security revolves around protecting against hacker attacks. Actually, the greatest threat is from your users. One of the most common threats to Email Security is phishing. Phishing is a threat where a thief tries to use email as a means to find out information that can be used to extract […]