A data breach occurs when sensitive, confidential or protected information is accessed, disclosed, stolen or used by an unauthorised individual or organisation. Businesses and individuals need correctly configured Cyber Security… Read more »
Over the last few years, people are interacting more and more online. They were forced to during lockdowns, discovered the convenience of e-commerce and collaboration tools, like Zoom, and continued… Read more »
The rise of the Internet of Things and broadband cellular and fibre services to the home has made it possible to extend services previously only available to commercial sites to… Read more »
Public WiFi is becoming more and more common. Free WiFi, sounds great, especially for the mobile worker, but there are some serious Online Security concerns. Some municipalities are rolling out… Read more »
The move to working from home and increasing remote access to corporate systems over the last couple of years has increased the potential attack surface for malware and general IT… Read more »
A key part of ensuring Website Security is to use SSL Certification. The SSL certification process for websites started in 2014 with the Google initiative, “HTTPS Everywhere”. They awarded a… Read more »
Most businesses have had to radically change their IT strategies over the last two years. Working from home and remote access to systems and data have changed the online security… Read more »
The concept of Shadows IT and the implications for Online Security have recently moved to prominence in the IT community. It’s always been around but has only been dignified with… Read more »
IT Security has moved from a nice to have to a critical component of the IT environment. The move to e-commerce, working from home and remote access has moved it… Read more »
Malware attacks and general hacking attacks are increasing, both in frequency and virulence as the Public Sector and commercial companies move online, thereby potentially exposing customer data. Data has been… Read more »