Category: Security
-
How to Keep Malware Out of Your Printers
The landscape of cybersecurity is always changing, and new threats are constantly emerging. One of the newest – and the most interesting, if you are into that kind of thing – is the rise of printer malware. This type of malware started to be reported in November 2017, when Barracuda Labs saw an attack […]
-
Is Blockchain a Permanent Fixture in the IT Industry?
By Des Nnochiri In essence, the nature of business comes down to different companies exchanging value with supplier, partners, and customers. By “value”, we mean goods, services, money, and data. This is the fundamental basis of any business and it has to do this effectively in order to make a profit and survive. […]
-
Three Cybersecurity Trends for 2019
By Des Nnochiri From online banking, insuring cars, and shopping, we are almost totally reliant upon the internet to complete daily tasks and make our lives easier. However, as technological advancements give us greater convenience, increase productivity, and provide greater access to whole new swathes of entertainment, consumers and businesses alike leave themselves […]
-
When Should You Host Applications Onsite?
By Des Nnochiri When it comes to hosting applications, business and IT administrators often need to make tough decisions as to whether cloud hosting or retention of the software at their own data center is the preferred option. Public cloud hosting may have the edge in terms of scale and distribution, but there are […]
-
Best Security Practices for Enterprise IoT
By Des Nnochiri Internet of Things (IoT) security ranks as a major concern for many enterprises. A 2018 survey of over 600 IT decision-makers worldwide conducted by 451 Research found that 55% of those polled rated IoT security as their top priority. It’s easy to see why. As well as any “smart, connected” devices […]
-
Cyber Security in the Movies – Is It Realistic?
By Des Nnochiri Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security […]