Network Access Control

The number of endpoints on IT networks is expanding at an ever-increasing rate. User devices have moved beyond the traditional desktop and laptop to include smartphones, tablets, and wearable devices with network connectivity, such as the Apple Watch. The rapid growth seen for mobile devices over the last decade may now have stalled, but the […]

Gain the confidence to open, click and trust everything in your inbox

  Even with the rise of platforms such as Slack and Microsoft Teams, email is still the essential business communication tool. Estimates put the number of business emails sent and received at just under 300 Billion for 2019, increasing to an estimated 345 Billion by 2023. With the benefits that email brings to further effective […]

Veracode And Code Security

It’s almost a decade since Marc Andreessen wrote his influential “Why Software Is Eating the World” article in The Wall Street Journal. In the article he outlined how software systems were, and would continue to, disrupt and replace traditional business models with layers of software and applications on the web and mobile devices. His prediction […]

Beware Ransomware!

“The files on this computer have been encrypted! You have 96 hours to submit payment, otherwise your files will be permanently destroyed!” The message no one wants to read, you’ve been hit with RANSOMWARE. Such attacks can be costly for businesses as ransomware infects a computer, blocks access to computer files and demands that money […]

Business Continuity – Make a List & Check it Twice

When it comes to business continuity, plans aren’t meant to cover every eventuality but rather provide a starting point and a guide as you work through the situation as it develops. That said, it is important that the plans deliver articulate, clear and concise procedures so if a business critical issue or disaster does occur, […]

The Rise and Fall of the humble Password – Authentication!

Ah, simpler times, a decade ago if you had your username and a password you could log in! Things started to get a little trickier when we saw the start of “remote users” who could “dial in” to access their accounts.   From this point things really changed, and that threat landscape grew. Connectivity expanded exponentially, […]

Business Continuity – Keeping your Data Safe and Business Trading

Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation. What is it? Identity and access management (IAM) is the security discipline that enables the right individuals to access the […]

Square or Round Wheels?

It all boils down to 1 question, “Are you too busy to improve?” This is a great enabler for the discussion on how to improve. It’s so simple and a great way to start the discussion on any complex matters. I have seen it quoted, shared and commented on many times, which tells us 2 […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In times of disaster or disruption, employees may need to work […]

8 Top Tips for Keeping Your IT in Great Shape

In one way or another, Information Technology (IT) is an integral part of any business and we often don’t realise how much we rely on it until it’s non-operational. When such a thing occurs, business day-to-day operations are slowed and can even grind to a halt. Luckily, you can reduce the stress and damage that […]