vPro

NewsFrom the team

Posts by Topic

see all

Fast solutions for MiFID II communications compliance

Posted by Business Development Manager - Datacentre Solutions on 26-Jan-2018 15:34:10
2018 set to be the ‘year of communications compliance’ 2018 is going to raise the compliance bar for everyone. While many firms are still struggling to catch up with the EU General Data Protection Regulation (GDPR) due to take effect in May, those working in the financial sector have an even more pressing deadline. The European Markets in Financial Instrument Directive (MiFID II) and the accompanying regulation (MiFIR) have already come into force (3rd January). Read article

Email – The #1 Threat Vector

Posted by Business Development Manager - Datacentre Solutions on 26-Jan-2018 10:08:53
The weakest point of security in any organisation is the users, either due to a lack of awareness or security fatigue. Attackers know this, and they target users through email because with a working email address, a malicious but well-crafted attack could easily get in front of a vulnerable employee.  Attackers are also very determined, so they will continue to pursue a target-rich environment until they find a gap in defenses.  A recent Consumer Affairs article reports that as many as one-third of AV scanners failed to find malware samples in a two month test.  That's why attackers keep trying, even when they know a company has anti-virus protection in place. Read article

3 Tips To Ensure Your Business Data Security with Digital Lock and Key

Posted by Vohkus on 26-Jan-2018 08:11:22
Just like your business premises, your customer relationships and your staff, the data you store is integral to how your business operates. Read article

Lessons for businesses from the Uber hack

Posted by Business Development Manager - Datacentre Solutions on 25-Jan-2018 16:57:46
Not just your average major technology breach The Uber hack disclosed publicly on 21 November 2017 raised several concerns that go beyond it being just another major technology breach. While there are obvious questions around how sensitive information could have been allowed to be compromised and how the ride-hailing firm should make amends to those affected, there is ample scope for criticism about the way it responded to the attack, its apparent cavalier approach to corporate governance, and its general risk management. Read article

Evaluate the strength of your mobile security in 4 steps

Posted by Business Development Manager - Datacentre Solutions on 12-Jan-2018 15:02:18
 More than half of enterprise organisations encounter security and compliance issues during mobile deployment efforts. Read article