Latest from our business, security
and technology blog

Search the blog:

    2019-07-30 08:28:18

    The New Rules for Passwords in 2019

    Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

    2019-07-22 09:45:33

    Going to The Darkside?

    The internet has become an integral part of most people’s lives to the point that it’s hard to imagine a time when it didn’t exist - assuming you’re old enough to remember that it really hasn’t been around forever.

    2019-07-01 09:58:08

    One Year On from GDPR: What’s Changed?

    The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. At the time it was heralded as a major change in the way individuals and organisations will think about – and collect, manage and secure – data.

    2019-06-25 10:26:02

    Doubling up: why two-factor authentication is your next step in digital security

    We’ve written about the need for additional layers of security for passwords, especially given the increased targeting of Microsoft’s Office 365 as more and more businesses and individuals migrate to the cloud, especially for email.

    2019-06-11 09:12:23

    Are Your Websites and Applications Secure?

    What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

    2019-04-30 08:23:21

    Education, Education, Education

    Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...

    2019-03-18 11:15:43

    Office 365 Popularity Grows…as does its potential vulnerability

    Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2018-11-05 07:30:22

    Why You Should be Using 2 Factor Authentication Right Now!

    Verizon’s 2017 Data Breach Investigations Report found that 81% of of hacking-related breaches leveraged either stolen and/or weak passwords.

    1 2 3