INSIGHTS FROM INDUSTRY EXPERTS

Email – The #1 Threat Vector

The weakest point of security in any organisation is ...

Does Your IT Security Policy Cover Data Integrity? Here's Why They Should

What is data integrity? Data integrity basically ...

Subscribe

Join our subscribers and get access to industry news, security updates, workplace innovations and lots more straight to your inbox!

security

Email – The #1 Threat Vector

The weakest point of security in any organisation is the users, either due to a lack of awareness or security fatigue. Attackers know this, and they target users through email because with a working ...

Topics: security barracuda threat scanner

Keep reading

Does Your IT Security Policy Cover Data Integrity? Here's Why They Should

What is data integrity? Data integrity basically translates as handling data safely, preventing corruption, unlawful changes, and unauthorised access. Safety can be breached because of accidental ...

Topics: security data protection support data integrity consult deploy latest manage supply

Keep reading

3 Tips To Ensure Your Business Data Security with Digital Lock and Key

Just like your business premises, your customer relationships and your staff, the data you store is integral to how your business operates.

Topics: security Security Threats

Keep reading

Lessons for businesses from the Uber hack

Not just your average major technology breach The Uber hack disclosed publicly on 21 November 2017 raised several concerns that go beyond it being just another major technology breach. While there ...

Topics: security Security Threats Cyber Security cloud security

Keep reading

Evaluate the strength of your mobile security in 4 steps

 More than half of enterprise organisations encounter security and compliance issues during mobile deployment efforts.

Topics: security mobile security check point

Keep reading

Whose responsibility is public cloud security?

We all know public cloud adoption is on the rise, with many organisations reaping the undeniable benefits of greater IT efficiency, business agility, scalability and cost savings. Yet for many, ...

Topics: security public cloud gdpr barracuda

Keep reading

Krackdown on the Krack security vulnerability

WPA2 is the protocol that secures all modern protected Wi-Fi networks. Recently there’s been a great deal of concern after Mathy Vanhoef of KU Leuven published a microsite describing research that ...

Topics: security cisco Security Threats wireless

Keep reading

Equifax breach highlights need for data to be located in UK

‘Biggest in history’ breach has lessons for UK businesses In an announcement after normal business hours on Friday 15 September, credit reference giant Equifax made the astonishing admission ...

Topics: security cloud data protection Vohkus Cyber Security

Keep reading

Brexit, GDPR and UK data protection

What do UK firms actually need to do? At Vohkus we’re getting more and more customers asking about GDPR. And the government’s data protection proposals since the Queen’s Speech have only confused ...

Topics: security Brexit Security Threats Cyber Security gdpr

Keep reading

Backup strategies for the modern data centres

Backup products have had to adapt Think of backup and you probably picture long overnight batch jobs – possibly still to tape – with recovery times that are not really up to scratch in terms of ...

Topics: security HPE backup disaster recovery Microsoft Azure data centre Veeam

Keep reading

View more Posts