What is the Danger of BYO Device Policies?

How to Protect your Network from Personal Devices The “consumerisation’ of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD). These policies have become prevalent in most corporate environments, and […]

Read More…

Regulating IT: The Two Most Important IT Security Takeaways from Cyber Regulations

The biggest challenge facing most companies today is IT security. The seemingly endless increase in cyber-attacks and password breaches are only the tip of the iceberg. A tightening of all regulations and compliance requirements around IT Security, foreign conflicts that are now affecting the average consumer, and the increase in the number of networkable devices […]

Read More…