One area of increasing concern to Cyber Security is the intersection of AI, Big Data, personal privacy, and ID Theft. Privacy concerns arise when using data containing personal information. For… Read more »
Remote working is now a fact of life. Last year, it was mainly road warriors using public access WiFi in public spaces and from home to reach corporate systems. More… Read more »
Online Security has emerged as one of the top ICT areas of concern. It’s not just in the general areas of malware protection and network security. As the use of… Read more »
In answer to the question “Are University Records Safe from Cyber Attacks?”, the answer is no, they are just as safe as any other complex and extensive, often multi-site corporate… Read more »
It has become a no-brainer that all businesses must have an online presence. A company may have an internal network which it uses for administration, such as wages and salaries,… Read more »
The big recent differentiator in online security is now the Internet, potentially allowing anyone accesses to any system, anywhere anytime. A typical user needs to remember many combinations of credentials… Read more »
The phrase “Google It” has become part of the language, demonstrating just how dependent we are becoming on using browsers to find out things and communicate with each other. We… Read more »
One significant aspect of the change to the work environment in recent years has been the emergence of the road warrior, the mobile worker. In essence, the difference between the… Read more »
The technical side of network security is a complex ongoing dogfight between the white hats of network security and the black hats of hackers and other cybercriminals. As a result,… Read more »
Part of any IT Security policy is to ensure that as far as possible, websites are genuine. Sometimes you are presented with a message saying a site has failed a… Read more »