A data breach occurs when sensitive, confidential or protected information is accessed, disclosed, stolen or used by an unauthorised individual or organisation. Businesses and individuals need correctly configured Cyber Security… Read more »
The rise of the Internet of Things and broadband cellular and fibre services to the home has made it possible to extend services previously only available to commercial sites to… Read more »
With the move to e-commerce and remote working forced on businesses, IT departments have had to take IT Security even more seriously. Opening up infrastructure and systems to remote access… Read more »
Cloud Security is something that IT needs to consider very seriously as businesses move their operations to the Cloud. The security hardware and software and the policies and procedures they… Read more »
Most businesses have had to radically change their IT strategies over the last two years. Working from home and remote access to systems and data have changed the online security… Read more »
The concept of Shadows IT and the implications for Online Security have recently moved to prominence in the IT community. It’s always been around but has only been dignified with… Read more »
IT Security has moved from a nice to have to a critical component of the IT environment. The move to e-commerce, working from home and remote access has moved it… Read more »
Malware attacks and general hacking attacks are increasing, both in frequency and virulence as the Public Sector and commercial companies move online, thereby potentially exposing customer data. Data has been… Read more »
Education at all levels has transformed over the last few years. Education in its various forms had been gradually implementing E-Learning for several years, especially at the tertiary level. Many… Read more »
Securing data and intellectual property access via a physical network is a key issue in IT today. In 2020, malware attacks have been increasing in frequency and ferocity, and over… Read more »