<img height="1" width="1" src="https://www.facebook.com/tr?id=248146345985568&amp;ev=PageView &amp;noscript=1">

INSIGHTS FROM INDUSTRY EXPERTS

Email – The #1 Threat Vector

The weakest point of security in any organisation is ...

Does Your IT Security Policy Cover Data Integrity? Here's Why They Should

What is data integrity? Data integrity basically ...

Subscribe

Join our subscribers and get access to industry news, security updates, workplace innovations and lots more straight to your inbox!

security

Email – The #1 Threat Vector

The weakest point of security in any organisation is the users, either due to a lack of awareness or security fatigue. Attackers know this, and they target users through email because with a working ...

Topics: barracuda threat scanner security

Keep reading

Does Your IT Security Policy Cover Data Integrity? Here's Why They Should

What is data integrity? Data integrity basically translates as handling data safely, preventing corruption, unlawful changes, and unauthorised access. Safety can be breached because of accidental ...

Topics: data protection data integrity security consult deploy manage supply support latest

Keep reading

3 Tips To Ensure Your Business Data Security with Digital Lock and Key

Just like your business premises, your customer relationships and your staff, the data you store is integral to how your business operates.

Topics: security Security Threats

Keep reading

Lessons for businesses from the Uber hack

Not just your average major technology breach The Uber hack disclosed publicly on 21 November 2017 raised several concerns that go beyond it being just another major technology breach. While there ...

Topics: Cyber Security Security Threats security cloud security

Keep reading

Evaluate the strength of your mobile security in 4 steps

 More than half of enterprise organisations encounter security and compliance issues during mobile deployment efforts.

Topics: check point mobile security security

Keep reading

Whose responsibility is public cloud security?

We all know public cloud adoption is on the rise, with many organisations reaping the undeniable benefits of greater IT efficiency, business agility, scalability and cost savings. Yet for many, ...

Topics: public cloud barracuda security gdpr

Keep reading

Krackdown on the Krack security vulnerability

WPA2 is the protocol that secures all modern protected Wi-Fi networks. Recently there’s been a great deal of concern after Mathy Vanhoef of KU Leuven published a microsite describing research that ...

Topics: Security Threats wireless cisco security

Keep reading

Equifax breach highlights need for data to be located in UK

‘Biggest in history’ breach has lessons for UK businesses In an announcement after normal business hours on Friday 15 September, credit reference giant Equifax made the astonishing admission ...

Topics: security data protection cloud Cyber Security Vohkus

Keep reading

Brexit, GDPR and UK data protection

What do UK firms actually need to do? At Vohkus we’re getting more and more customers asking about GDPR. And the government’s data protection proposals since the Queen’s Speech have only confused ...

Topics: Cyber Security Security Threats security gdpr Brexit

Keep reading

Backup strategies for the modern data centres

Backup products have had to adapt Think of backup and you probably picture long overnight batch jobs – possibly still to tape – with recovery times that are not really up to scratch in terms of ...

Topics: backup data centre security Veeam HPE Microsoft Azure disaster recovery

Keep reading

View more Posts