The number of cyber security breaches is down – but is it too soon to celebrate?
New figures from the Department for Digital, Culture, Media and Sport reveal that the number of businesses reporting breaches and cyber attacks has fallen. This is in line with a similar trend seen by the general public in the Crime Survey for England and Wales. [2] The number of businesses experiencing an attack in the […]
Read MoreFacebook’s 2FA may be making you less private
As high profile data breaches and leaks continue to hit the headlines, more people are becoming aware of the benefits of two-factor authentication (2FA). This allows you to overcome the weaknesses of relying on just a password by having an authentication code sent to a mobile phone – either as a text or via an […]
Read MoreAre Chinese tech firms a threat to western security?
The future promised us by technology companies is one of smart cities wherein autonomous vehicles will negotiate with each other to find congestion-free routes; where public services such as health and energy provision will be managed efficiently through data; and where even our homes will be run by smart devices. Whether you think this represents […]
Read MoreHow the cloud is transforming IT
We all know that the IT world is a fast moving one. One of the major shifts in recent years has been the movement of systems to the cloud. This started with storage as public services quickly caught on as a way to store and exchange data. But as faster and more reliable internet connections […]
Read MoreThe clock is ticking on replacing Windows 7
Mainstream support for Windows 7 stopped in 2015, but with extended support and therefore security updates for Windows 7 due to end in January 2020, the minds of many IT support professionals are focussing on what they need to do to update or replace older systems. We all know that unpatched older systems represent a […]
Read MoreUnified threat management – What is it and why does it matter?
The cyber threat landscape has become much more complex in recent years and that has made defending corporate networks far harder. Many companies are turning to a multi-layered approach, integrating several security technologies into a single security strategy. This may involve in-house installations and managed services. In order to manage this approach, unified threat management […]
Read MoreAfter Google was hit with €50m GDPR fine, what next ?
When the General Data Protection Regulation (GDPR) was introduced last year, giving regulators the ability to levy big fines of up to four per cent of turnover for non-compliance, it was only going to be a matter of time before a company got caught out. It is perhaps surprising, however, that one of the first […]
Read MoreKey Microsoft products approach the end of their support lives
As we move into 2019, a number of significant Microsoft products are entering the final 12 months in which they will receive regular updates from the company. [1] Most significant of these is Windows 7, which will lose support on the 14th of January 2020. On the same date, Windows Server 2008 R2 Service Pack […]
Read MoreHow businesses can make the most of their cloud resources
Cloud technology has now been around for long enough that most companies have adopted it in some form. Whether it’s public, private, or hybrid, the cloud is now widely used and it’s matured into being far more than just a storage medium. The global cloud market is expected to exceed $1 trillion by 2024 [1] […]
Read MoreThe IT security trends to look for in 2019
The IT security trends to look for in 2019 The cyber security landscape is a constantly evolving one; not only do threats change but so does the technology to fight them, together with the regulatory landscape surrounding the protection of data. So, what are some of the trends that will impact how businesses secure their […]
Read More