Search the blog:
Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?
The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. At the time it was heralded as a major change in the way individuals and organisations will think about – and collect, manage and secure – data.
Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.
Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...
Developing an IT strategy can be a daunting task to start, especially if you’ve not done it before. Our new guide helps to demystify the process and offers a five-step approach to help you to get it done.
Staff training has a key role to play in any cyber security and information management strategy. So how do you begin to plan what needs to be done?
People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.
With organisations under more pressure than ever to protect their customers’ data, and more and more information being stored digitally, Grant McGregor takes a look at encryption and the possibilities it offers to help small businesses protect their data.
When I first started my working life, I worked for an organisation where, if you called the IT helpdesk, the “help” consisted of two standard responses: