Archive | Features RSS feed for this section

Lock up your data

Lost information is no laughing matter for business. Encryption is a solution. So why aren’t more companies using it to the full? Confidential data left on a train or in a taxi is now such a commonplace of modern life that it’s become a staple for stand-up comedians. But it’s no joke for organisations whose poor data [...]

Leave a comment Continue Reading →

Are you cloud-ready?

Relying on the service provider to secure your system is all very well but businesses shouldn’t abandon their in-house processes It seems that the most common and practical approach to cloud computing security is a Reaganite solution – trust, but verify. How much you get involved in the security of your data depends on the [...]

Leave a comment Continue Reading →

Don’t be a drive-by victim

Tens of millions of websites may be infected by malware but often it’s only when the victims complain that the crime comes to light  It’s called “drive-by downloading”: poisoning a computer with malware when the unsuspecting owner visits an infected website. All the victim has to do is download a file, install a codec, click [...]

Leave a comment Continue Reading →

Identifying the enemy within

Your company software may be the fatal weakness that allows hackers entry to the system to wreak havoc on your business A hacker’s entry point into your organisation may well be the very software on which your business depends. The 2011 Global Information Security Workforce Study by Frost and Sullivan for industry group (ISC)2 listed [...]

Leave a comment Continue Reading →

Tried and trusted troubleshooter

Anti-malware software has played a vital role in securing laptops, smartphones and other portable technologies. Is it still fit for the task? As business boundaries dissolve with the rise of remote working and mobile devices, there is an ever-greater focus on securing endpoints such as PCs, laptops, smartphones and tablet devices. While there are many [...]

Leave a comment Continue Reading →