Where next for cloud technology?
When the cloud first emerged in the 2000s, the world wasn’t really ready for it. The attractions of cloud storage, for example, were obvious, but a lack of fast, reliable internet connections limited its usefulness. The 2010s saw the cloud coming of age as networking technology caught up to the point where not only could […]
Read MoreWhat does 2020 hold for IT Security?
As we move into the start of a new decade, we can be sure that the world of IT security isn’t going to stand still. There will be new and emerging threats as well as existing ones to challenge IT departments. But what are some of the key developments that we can expect to see […]
Read MoreWhy the cloud is crucial to our future
Although the idea of the cloud isn’t a new one, it’s only with the advent of fast fibre optic networks opening up high-speed internet access to large areas of the world that its full potential is starting to be realised. In its early days, the cloud was simply a place to store data, whether backups […]
Read MoreFake social media profiles and how to spot them
Social networking for grown-ups site LinkedIn recently announced a crackdown on fake profiles. The site which has more than 600 million users around the world has been plagued by the fakes which are often used to send spam messages or phish for information. LinkedIn has taken action on over 21 million fake profiles in the […]
Read MoreBig data and how it can assist IT support
In the last few years, businesses have started to accumulate vast amounts of data about their customers. This is thanks to online transactions, Internet of Things devices and more. In many cases, that data is being used to improve services or boost health outcomes. In others, it’s being used for shadier purposes. [1] One area […]
Read MoreCapital One breach raises doubts over cloud security
Credit card company Capital One revealed on Monday the 29th of July that information on over 106 million of its customers had been exposed in one of the largest banking breaches ever. [1] The breach took place on the 19th of July and exposed the data of mainly US and Canadian customers applying for credit […]
Read MoreThe IT security trends you can’t afford to ignore
Information technology is a rapidly changing field and IT security even more so. Since the introduction of GDPR in 2018, we’ve seen a shift in emphasis towards personal data and ensuring it’s held in accordance with compliance rules. This, in turn, has put more pressure on firms to guard personally identifiable information (PII) effectively, in […]
Read MoreCombating insider business threats without harming trust
According to research from the Ponemon Institute [1] insider threats are now one of the biggest risks that businesses face globally, accounting for around 64 per cent of all security breaches. In order to combat these threats, many businesses are turning to employee monitoring, but how can this be managed without creating distrust among staff? […]
Read MoreThere’s a cyber skills shortage – it’s official
There has been talk within the IT industry of a shortage of cyber security skills for several years. However, last week the Government made the shortage official by adding cyber security engineers and analysts to its Shortage Occupation List. [1] The SOL, drawn up by the Government’s Migration Advisory Committee, is the recognised measure of […]
Read MoreIs it the end of the road for the password?
People have been predicting the demise of the password for a long time. No less a person than Bill Gates did so in 2004. [1] Yet, 15 years on from Bill’s comments, we are still heavily reliant on passwords for many of our business and online activities. Indeed we probably have more than ever. In […]
Read More