Blog Header

In: Security

GDPR- What steps have you taken?

At this stage most businesses are aware of the premise of the GDPR and some of the steps that they should...

CYBER SECURITY: A GROWING CONCERN.

The days of cyber attackers only targetting large businesses are in the past. In the modern world, ensuring that your cyber...

Firewalls

BUILDING A FIREWALL TO SUIT SECURITY NEEDS

A firewall helps keep a multitude of malware at bay, writes Ian Burns, Director at Inspired Technology Services. The network security...

adaptive-security

GETTING TOUGH ON DATA BREACHES WITH ADAPTIVE SECURITY ARCHITECTURE

In light of the news that more than one billion Yahoo user accounts have been affected in a hacking attack, data...

penetration testing

IOT AND SECURITY IN THE FUTURE

Cybersecurity continues to evolve but with the Internet of Things (IoT), security is not just about the safety of the device...

Unified Threat Management

KEEPING IT SECURE WITH UNIFIED THREAT MANAGEMENT (UTM)

Cybercrime continues to pose a real threat to the growth and profitability of small and medium-sized businesses.  Some of the worst...

Internet of Things (IoT)

What the Internet of Things (IoT) Means to Your Data Secutiry

We hear the term Internet of Things (IoT) in the tech world all the time now, but what does it really mean...

Ransomware

Ransomware

You might think that being held to ransom is the stuff of movies but cybercriminals are attacking small businesses in an...

security

PREDICTIVE SECURITY ISN’T SCIENCE FICTION

In the wake of several high profile cyber attacks in the USA including infidelity website Ashley Madison and Sony Film Studios,...