Lots of good things come in threes. The Pyramids at Giza. Goals in a hat trick. Books in Lord of the Rings. Examples in this list… no wait… But there are also three crucial considerations when securing your network. Whether you’re a microbusiness or a multinational...
Sourcing a firewall for your business is rarely as simple as heading to a supplier and saying “I’ll have that one please.” With myriad options on the market and countless product data sheets available online, choosing a business firewall can feel like a bit of a...
What do you think is the most effective and potentially devastating way for a criminal to launch a cyber attack on a business? Directly hacking through the firewall? Waiting for someone to happen across the attacker’s malware online? Maybe injecting code into their...
It’s an unavoidable security reality: portable devices like laptops, smartphones, and tablets require a bit more security consideration than static devices that “live” on site. But their sheer lose-ability and steal-ability is just one issue. We also have to think...
The longer it takes to identify and contain a cyber breach, the more costly the breach becomes. But don’t just take that from us, it comes to us from industry bigwigs IBM. In their 2021 “Cost of a Data Breach” study, they found that it takes an average of 287 days to...
The so-called cybercrime “industry” never stands still. Cybercriminals are always ducking and diving to evade new security defences and to maximise their profits. According to the boffins at security vendor SonicWall, 2021 was a record-breaking year for cyber-nasties....