Blog Header

In: Security

Firewalls

BUILDING A FIREWALL TO SUIT SECURITY NEEDS

A firewall helps keep a multitude of malware at bay, writes Ian Burns, Director at Inspired Technology Services. The network security...

adaptive-security

GETTING TOUGH ON DATA BREACHES WITH ADAPTIVE SECURITY ARCHITECTURE

In light of the news that more than one billion Yahoo user accounts have been affected in a hacking attack, data...

cloud

EVERY INSECURE CLOUD NEEDS A GATEKEEPER

Planning a robust and bulletproof security strategy in a world which has become dominated by cloud applications and technology is never...

Internet of Things (IoT)

What the Internet of Things (IoT) Means to Your Data Secutiry

We hear the term Internet of Things (IoT) in the tech world all the time now, but what does it really mean...

safe and secure

A VERY BRIEF HISTORY OF IT – PART 3

Part 3 – Safe and secure Since the year 2000, the internet has grown to become a very powerful platform and...

BYOD

THE HIGHS AND LOWS OF BYOD

In the workplace, employees sometimes find their IT departments struggle to keep up with the pace of technology change which is...

Ransomware

Ransomware

You might think that being held to ransom is the stuff of movies but cybercriminals are attacking small businesses in an...

digital vandalism

THE RISE OF DIGITAL VANDALISM

According to analyst firm Gartner, there will be 26 billion wirelessly connected devices on the Internet of Things (IoT) by 2020...

iboss secure future

IBOSS TAKES A LEAP INTO A SECURE FUTURE

At a time when cyber attacks are probably one of the biggest threats to our national security, it hardly comes as...

security

PREDICTIVE SECURITY ISN’T SCIENCE FICTION

In the wake of several high profile cyber attacks in the USA including infidelity website Ashley Madison and Sony Film Studios,...