
BUILDING A FIREWALL TO SUIT SECURITY NEEDS
A firewall helps keep a multitude of malware at bay, writes Ian Burns, Director at Inspired Technology Services. The network security...

GETTING TOUGH ON DATA BREACHES WITH ADAPTIVE SECURITY ARCHITECTURE
In light of the news that more than one billion Yahoo user accounts have been affected in a hacking attack, data...

EVERY INSECURE CLOUD NEEDS A GATEKEEPER
Planning a robust and bulletproof security strategy in a world which has become dominated by cloud applications and technology is never...

What the Internet of Things (IoT) Means to Your Data Secutiry
We hear the term Internet of Things (IoT) in the tech world all the time now, but what does it really mean...

A VERY BRIEF HISTORY OF IT – PART 3
Part 3 – Safe and secure Since the year 2000, the internet has grown to become a very powerful platform and...

THE HIGHS AND LOWS OF BYOD
In the workplace, employees sometimes find their IT departments struggle to keep up with the pace of technology change which is...

Ransomware
You might think that being held to ransom is the stuff of movies but cybercriminals are attacking small businesses in an...

THE RISE OF DIGITAL VANDALISM
According to analyst firm Gartner, there will be 26 billion wirelessly connected devices on the Internet of Things (IoT) by 2020...

IBOSS TAKES A LEAP INTO A SECURE FUTURE
- November 18, 2015
- Ian Burns
- Industry News
At a time when cyber attacks are probably one of the biggest threats to our national security, it hardly comes as...

PREDICTIVE SECURITY ISN’T SCIENCE FICTION
In the wake of several high profile cyber attacks in the USA including infidelity website Ashley Madison and Sony Film Studios,...