A data breach occurs when sensitive, confidential or protected information is accessed, disclosed, stolen or used by an unauthorised individual or organisation. Businesses and individuals need correctly configured Cyber Security… Read more »
The rise of the Internet of Things and broadband cellular and fibre services to the home has made it possible to extend services previously only available to commercial sites to… Read more »
Public WiFi is becoming more and more common. Free WiFi, sounds great, especially for the mobile worker, but there are some serious Online Security concerns. Some municipalities are rolling out… Read more »
IT Security is a big thing today. Malware and hacking attacks are on the increase, and it seems that we see reports of major exploits every day in the media…. Read more »
The move to working from home and increasing remote access to corporate systems over the last couple of years has increased the potential attack surface for malware and general IT… Read more »
With the move to e-commerce and remote working forced on businesses, IT departments have had to take IT Security even more seriously. Opening up infrastructure and systems to remote access… Read more »
A key part of ensuring Website Security is to use SSL Certification. The SSL certification process for websites started in 2014 with the Google initiative, “HTTPS Everywhere”. They awarded a… Read more »
Most businesses have had to radically change their IT strategies over the last two years. Working from home and remote access to systems and data have changed the online security… Read more »
The concept of Shadows IT and the implications for Online Security have recently moved to prominence in the IT community. It’s always been around but has only been dignified with… Read more »
IT Security has moved from a nice to have to a critical component of the IT environment. The move to e-commerce, working from home and remote access has moved it… Read more »