IT Security has become a big business in itself. In parallel, cyber criminals are attacking the IT Security software and appliances intended to thwart their exploits. We read lurid reports… Read more »
Everyone who uses the Internet has an Online Identity. Every time you use an online app, simply visit a website or run a search, you leave digital footprints. Working from… Read more »
Over the last two years or so, many organisations have upgraded or created their online presence. Many have moved to e-commerce, and many have made their main customer and media… Read more »
Over the last few years, many businesses have seen a dramatic increase in their use of remote connectivity to corporate systems and data. Staff now work from home, road warriors… Read more »
The increased use of remote computing and working from home has been accompanied by an increase in computer malware attacks. Often home users have poor Cyber Security Services, with the… Read more »
A data breach occurs when sensitive, confidential or protected information is accessed, disclosed, stolen or used by an unauthorised individual or organisation. Businesses and individuals need correctly configured Cyber Security… Read more »
Over the last few years, people are interacting more and more online. They were forced to during lockdowns, discovered the convenience of e-commerce and collaboration tools, like Zoom, and continued… Read more »
The rise of the Internet of Things and broadband cellular and fibre services to the home has made it possible to extend services previously only available to commercial sites to… Read more »
Public WiFi is becoming more and more common. Free WiFi, sounds great, especially for the mobile worker, but there are some serious Online Security concerns. Some municipalities are rolling out… Read more »
The move to working from home and increasing remote access to corporate systems over the last couple of years has increased the potential attack surface for malware and general IT… Read more »