How to Protect your Network from Personal Devices The “consumerisation’ of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD). These policies have become prevalent in most corporate environments, and […]
The Virtues of Virtual Private Networks (VPNs)
The Virtues of Virtual Private Networks Cloud computing is here to stay, and the buzz throughout industry and government is that hybrid clouds will become the new norm going forward. Hybrid clouds, according to industry experts, can offer the security of on premise, private clouds and the flexibility and agility of commercial public clouds. The […]
Regulating IT: The Two Most Important IT Security Takeaways from Cyber Regulations
The biggest challenge facing most companies today is IT security. The seemingly endless increase in cyber-attacks and password breaches are only the tip of the iceberg. A tightening of all regulations and compliance requirements around IT Security, foreign conflicts that are now affecting the average consumer, and the increase in the number of networkable devices […]
The IT Security Maturity Model for Any Company
Planning and policies for IT security pay off, not only in savings in the event of a data breach, but also by reducing the likelihood of a breach. According to a 2014 Ponemon study sponsored by IBM, the average cost to a company for each compromised record with sensitive or personal information was $201. But […]
Security Lessons Learned from 2014 – Authentication & Passwords
It’s a new year and as we look back at 2014, many businesses are discovering that last year was only the tip of cyber security hacks and security breaches. Last year will forever be known as “the year of the breach” with major security and data breaches happening to several major companies throughout the year. […]