Credit card fraud exposes need for alternative

A study released in December 2016 estimated it takes around six seconds to hack a credit or debit card. That means working out the card number, expiry date and security code of any debit or credit in the same time it takes to click ‘complete purchase’. The...

Why hire people to breach your network?

As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across all industries need to work on the assumption that they are a target. Because of this, organisations, especially those who house sensitive, valuable...

Next generation of Kaspersky Private Security Network

Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence from 80-million sensors,...

Shadow IT could be why businesses “wannacry”

There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Simeon Tassev, MD and QSA at Galix Networking, examines the issue. Opinion on Shadow IT is divided into two camps. Some believe...

Migrating to a digitised environment?

Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to,...

Securing customer communication is best left to experts

Every day, several times a day, customers trust businesses with their personal information. A single transaction can generate reams and reams of data. Identification numbers, physical addresses, phone numbers, bank account details — a customer parts with all...