Making the Move from Citrix

“No one ever got fired for buying…”   We’ve all seen this phrase used in various contexts when looking to procure an IT solution or service. Depending on your age you will have heard in its original form when referring to IBM, or more recently it may have been Microsoft, Cisco, or some other dominant […]

Securing Your Digital Identity

Many people have experienced the gut-churning feeling when they check their credit card statement and see unfamiliar transactions or log on to a social media account and see posts they didn’t make. That mobile phone SIM bought in a country they’ve never been to, and the Facebook post with a link to a phishing site […]

The Role of IAM in IOT

“Do you have valid ID?” We are all used to being asked for valid ID to prove who we say we are. From picking up a parcel at the post office, voting in elections or buying wine (if we are lucky enough to look that young), and in many other situations, proving your identity is […]

Veracode And Code Security

It’s almost a decade since Marc Andreessen wrote his influential “Why Software Is Eating the World” article in The Wall Street Journal. In the article he outlined how software systems were, and would continue to, disrupt and replace traditional business models with layers of software and applications on the web and mobile devices. His prediction […]

Blockchain: Cybersecurity Help or Hinderance?

Blockchain technology has wound its way around the world, it has seeped into every sphere of our lives from banking to healthcare and beyond. Blockchain Technology is defined by Alex Tapscott (2016) as being; “An incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value” […]

Beware Ransomware!

“The files on this computer have been encrypted! You have 96 hours to submit payment, otherwise your files will be permanently destroyed!” The message no one wants to read, you’ve been hit with RANSOMWARE. Such attacks can be costly for businesses as ransomware infects a computer, blocks access to computer files and demands that money […]

5 Tips for securing your Wi-Fi

You probably don’t give it much thought, but your wireless network is one of the most important aspects of conducting your day to day business and/or your personal affairs. Most business processes use a wireless network and without it, daily operations would slowly grind to a standstill. As Wi-Fi and internet technology has evolved and […]

Business Continuity – Make a List & Check it Twice

When it comes to business continuity, plans aren’t meant to cover every eventuality but rather provide a starting point and a guide as you work through the situation as it develops. That said, it is important that the plans deliver articulate, clear and concise procedures so if a business critical issue or disaster does occur, […]

The Thing is! (How to secure the IoT – Internet of Things)

Definition; Thing (noun) plural noun: things an object that one need not, cannot, or does not wish to give a specific name to. synonyms:   object, article, item, artefact, commodity; an inanimate material object as distinct from a living sentient being.   We are all familiar with the word “thing” it’s our go to word when […]

Phishing : Top Tips to stop you from getting reeled in

Warning! Please excuse the Puns and fish references! “Phishing” in cyber terms refers to the stealing of personal information that can lead to identity theft and financial fraud. Interestingly, phishing has been around for years and can manifest itself in many forms via phone calls and physical letter scams. However, with recent development in technology the most […]