Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

With the rise of the Internet of Things, businesses are now exposed more than ever before to the threats of cyber attacks and online fraud.  How can you ensure you minimise the risks posed by unsolicited fringe devices and keep your company protected? Jason Fry, a cybersecurity specialist and Managing Director at PAV i.t. services, investigates. When it comes to IT equipment, fringe devices aren’t always the first things on the radar when it comes to...

Read more

Digital technology has fundamentally changed business practice over the past decade. Cloud based applications dominate, workers routinely access corporate information remotely via smart phones and access to the corporate network increasingly includes supply chain members, contractors and part time workers.  Yet cyber security has failed to keep up – and some of the responsibility has to lie with the C-suite.  Why are cyber security experts not involved from day one in every strategic decision? Why...

Read more

Although social media is a powerful tool for professionals and businesses, it is also an equally powerful tool for cyber criminals. The same information used to express your personality and background can be used by cyber criminals to exploit personal and business vulnerabilities through elaborate social engineering schemes. And it’s happening far more often than one might expect. BrandProtect security experts recently analyzed Fortune 100 CEO Twitter and LinkedIn accounts to identify duplicate or copycat...

Read more
World and data

By Paul Slater, Executive Director of EMEA, Nuix In June, United Kingdom citizens voted to end their 43-year membership in the European Union (EU) and its predecessors. While the results of this historic decision will take years to play out, many businesses in the UK already face an interesting question: Do they need to continue working toward complying with the EU’s General Data Protection Regulation (GDPR)? The UK’s Information Commissioners Office (ICO) said in a statement that the UK’s Data Protection...

Read more

This year we have seen an average of ten updates a month from Microsoft alone.  Team this with Adobe having one to two bulletins a month and a number of subsequent updates from third parties including Oracle, Google, and Apple, there hasn’t been a month so far in 2016 where you have less than 14 bulletins to test and update! In anticipation of the law of averages holding true, I have prepared the following quick...

Read more
doctor

Stuart Facey, EMEA VP at Bomgar  The increased adoption of connected devices into medical services and processes, is streamlining and improving the manner in which medicine can be tracked, developed, sourced and distributed. On call/off site medical staff are also able to access information and source medicine on site, improving service levels and productivity. However the exponential advantages of integrating connected devices into this industry can potentially open up points of vulnerability which should increase...

Read more

Return on investment is a complicated factor to determine, as is your relative level of security. Damages from a single incident cost SMEs an average of $38K. Stay competitive by prioritising strategic security measures. Superior threat intelligence and breach detection will make you a less desirable target and give you peace of mind. Granted not every stakeholder sees value in peace of mind, so in order to get full support, make a case for the...

Read more

By Lewis Henderson, Director, Client Engagement at Glasswall Solutions The mass migration towards Office 365, Microsoft’s cloud-based email platform, shouldn’t come as a surprise. Offering cost-effective, global access to email and presenting businesses with an “always on” workforce, companies have begun shifting more of their communications into the cloud. Employees are now using Office 365 to send emails, attachments, share files and access their Office documents, comforted by the notion that a tech behemoth is...

Read more

By Colin Williams, Chief Technologist - Networking, Security & Unified Communications at Computacenter Agile software development is the next big thing – and rightly so for many organisations. Overall, agile is a set of principles that allows the development process to adapt, evolve and change, promoting continuous improvement and early deliveries. If speed of development (application), accelerated time to market and potentially reduced development costs are the primary aims of the enterprise, agile delivers immense...

Read more

The global hype around Nintendo’s new game, Pokémon GO, is unprecedented. But apart from being a fun attraction, it also carries with it an array of implicit risks to any organisation. The first risk is that of the fake Pokémon GO apps, which was already identified by ESET and ProofPoint in the last few days. This risk can be mitigated by forbidding ‘side installations’ of applications that didn’t originate from the official application stores of...

Read more
Page 46 of 69 1 45 46 47 69