Latest posts

Page 6

The ultimate network security checklist

If you’re tasked with network security, here is a simple list you can follow, broken down by category, which includes some tips and tricks for getting the job done.

Continue reading

Hack Hall of Shame – January 2016

We started the year with a wave of hacktivism which saw both Anonymous and New World Hacking launching attacks against the likes of Donald Trump, and Saudi Arabian, Thai and Nigerian government websites.

Continue reading

What makes a good password?

While using multi-factor authentication is the better way to go, when you just don’t have that option, creating, using, and enforcing good password practices can help so much with security.

Continue reading

Third Party Patch Roundup – January 2016

In January’s Third Party Patch Roundup we list Apple’s five updates, Adobe’s, Google’s and Oracle’s one, Mozilla officially released Firefox v.44, while Ubuntu issued 35 security advisories.

Continue reading

The 32 things you should do right now to make Data Protection Day count

Take the opportunity this Thursday, 28 January, to improve your own data privacy as well as the protections your organization takes with its data.

Continue reading

The long goodbye to password-only authentication

After many years of all talk and no action we’re finally seeing a move away from traditional username/password authentication scheme to alternative ways of verifying users.

Continue reading

7 tech predictions for 2016 you can take to the bank

It’s time to look forward and together with our 16 for’16: New Year resolutions for the new version of Exchange, today we will be speculating on a few predictions for 2016.

Continue reading

Who is your malware?

These days, it’s as much about what is your malware, as it is about who is your malware, since almost every single technical protection you implement can be circumvented by your users.

Continue reading