Oct 21, 2014
With an ongoing increase in threat vectors, largely brought on by the proliferation of business trends such as cloud computing, bring your own device (BYOD), and the Internet of Things (IoT), security awareness and training is becoming a critical aspect to...
Oct 21, 2014
The “castle and moat” approach to IT security is ineffective in an era where threats are likely already within the enterprise, and the real risk lies in what leaves the enterprise, not what gets in, writes Fortinet security consultant Jonas Thulin. Back in the days...
Oct 15, 2014
The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting, and they learn...
Oct 15, 2014
Research reveals time and again that weak login credentials, including passwords, remain among the top causes of data breaches around the world. Despite this, individuals continue to choose weak and insecure passwords to protect their most sensitive data. Simon...
Oct 14, 2014
Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cybercriminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the growing...
Oct 9, 2014
The level of innovation, research and development that defines access control in business reflects how seriously decision makers view this facet of operations management. The ability to compete in any industry or sector today is heavily dependent on the availability...