A data breach occurs when sensitive, confidential or protected information is accessed, disclosed, stolen or used by an unauthorised individual or organisation. Businesses and individuals need correctly configured Cyber Security… Read more »
Over the last few years, people are interacting more and more online. They were forced to during lockdowns, discovered the convenience of e-commerce and collaboration tools, like Zoom, and continued… Read more »
The rise of the Internet of Things and broadband cellular and fibre services to the home has made it possible to extend services previously only available to commercial sites to… Read more »
Public WiFi is becoming more and more common. Free WiFi, sounds great, especially for the mobile worker, but there are some serious Online Security concerns. Some municipalities are rolling out… Read more »
The move to working from home and increasing remote access to corporate systems over the last couple of years has increased the potential attack surface for malware and general IT… Read more »
Cloud Security is something that IT needs to consider very seriously as businesses move their operations to the Cloud. The security hardware and software and the policies and procedures they… Read more »
A key part of ensuring Website Security is to use SSL Certification. The SSL certification process for websites started in 2014 with the Google initiative, “HTTPS Everywhere”. They awarded a… Read more »
One of the effects of the pandemic has been to increase the amount of remote working, both as working from home and allowing third-parties access to corporate systems. Many organisations… Read more »
The concept of Shadows IT and the implications for Online Security have recently moved to prominence in the IT community. It’s always been around but has only been dignified with… Read more »
IT Security has moved from a nice to have to a critical component of the IT environment. The move to e-commerce, working from home and remote access has moved it… Read more »