Latest News

Latest Features

Keep the lid on leaks

Whether accidental or deliberate, data loss causes major headaches, so a rigorous – and regularly updated – protection strategy is vital Data leaks and losses have been with us since the earliest days of PCs in the 1980s. The good news is that solutions to data leaks and losses have also been available to PC [...]

Continue Reading →

Social insecurity

Unprotected, hugely popular, built on trust… and ripe for exploitation: no wonder cyber criminals find social networks irresistible “First,” says David Emm, a senior security researcher at Kaspersky Lab, “comes a good idea. Then that idea is developed and implemented. And only then, possibly, is security considered. Security is almost always retrofitted to a good [...]

Continue Reading →

Lock up your data

Lost information is no laughing matter for business. Encryption is a solution. So why aren’t more companies using it to the full? Confidential data left on a train or in a taxi is now such a commonplace of modern life that it’s become a staple for stand-up comedians. But it’s no joke for organisations whose poor data [...]

Continue Reading →

In hot pursuit of mal practice

Constantly reinventing itself, malware is a persistent thorn in the side of all IT users but there are a number of ways to combat it Malware – malicious software designed to access a computer system without the owner’s informed consent – has been around for three decades but today’s incarnation is far more agile and [...]

Continue Reading →

Are you cloud-ready?

Relying on the service provider to secure your system is all very well but businesses shouldn’t abandon their in-house processes It seems that the most common and practical approach to cloud computing security is a Reaganite solution – trust, but verify. How much you get involved in the security of your data depends on the [...]

Continue Reading →

Don’t be a drive-by victim

Tens of millions of websites may be infected by malware but often it’s only when the victims complain that the crime comes to light  It’s called “drive-by downloading”: poisoning a computer with malware when the unsuspecting owner visits an infected website. All the victim has to do is download a file, install a codec, click [...]

Continue Reading →

Identifying the enemy within

Your company software may be the fatal weakness that allows hackers entry to the system to wreak havoc on your business A hacker’s entry point into your organisation may well be the very software on which your business depends. The 2011 Global Information Security Workforce Study by Frost and Sullivan for industry group (ISC)2 listed [...]

Continue Reading →

Are smartphones your weakest link?

The PC in your pocket is a boon for business people on the move but it needs the same if not greater protection as your office-based technology It has been estimated that around a quarter of mobile phone users have a smartphone, essentially a microcomputer handset in their pocket or handbag that can make and [...]

Continue Reading →

Tried and trusted troubleshooter

Anti-malware software has played a vital role in securing laptops, smartphones and other portable technologies. Is it still fit for the task? As business boundaries dissolve with the rise of remote working and mobile devices, there is an ever-greater focus on securing endpoints such as PCs, laptops, smartphones and tablet devices. While there are many [...]

Continue Reading →

Double whammy

Ever-more sophisticated fraudsters and the expansion of cloud computing present a complex challenge to businesses. Tracking behaviour across the system could be the answer The two biggest drivers behind the evolution of cybercrime are the growing sophistication and organisation of the criminals and the migration of computing into the cloud. The former is typified by [...]

Continue Reading →