The network is the security device

Today the true power of the computer comes from being connected, and with more devices connected, so power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE), which is creating unprecedented opportunities...

Business security: Is simpler better?

While some companies can be pretty strict about their cyber security policies, and risk that at the end of the day this might be counterproductive, others apply more flexible approach. The problem with being too rigid is that it could be like trying to control the...

Why parents must teach their children about Internet security

Parenting, as we know it, is evolving in this modern, digital age.  Mothers and fathers have traditionally warned their children of the physical dangers, be they pickpockets on the street or strangers in the park. Today, however parents are facing an altogether...

Reducing the cyber-attack surface

Most breaches and attacks do not happen quickly and violently. They happen stealthily over time, with threat actors lurking inside your network for months at a time, performing reconnaissance and looking for your most valuable and sensitive information. “In fact, the...

A click away from sharing company info on Facebook

With the proliferation of mobile devices in the workplace, it has become critical to not only manage your mobile assets, but also protect your company’s data. The purpose of enabling a mobile workforce is to increase employee productivity and improve customer service,...

Changing the security culture

Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...