Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic...
Read MoreWeak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use...
Read MoreCybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...
Read MoreIdentity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten...
Read MoreThe IT security landscape has changed over the last few years. Historically organisations focused...
Read MoreDigital transformation has changed the face of business, driving disruptive change and creating...
Read MoreWhen the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...
Read MoreBeth Hood is a former advisor to the government on protective security. She now runs Verosa – a...
Read MoreWhen budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...
Read MoreThe Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...
Read MoreAs organizations digitally transform, critical systems and sensitive information can be accessed by...
Read MoreEnterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...
Read More