Tag: security
-
Best Security Practices for Enterprise IoT
By Des Nnochiri Internet of Things (IoT) security ranks as a major concern for many enterprises. A 2018 survey of over 600 IT decision-makers worldwide conducted by 451 Research found that 55% of those polled rated IoT security as their top priority. It’s easy to see why. As well as any “smart, connected” devices […]
-
Cyber Security in the Movies – Is It Realistic?
By Des Nnochiri Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security […]
-
7 Cyber Security Tips for Small Businesses
Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you’re a small business without a big security budget, […]
-
What’s Next for Cloud Computing?
By Des Nnochiri Over the last decade, cloud computing has revolutionized the way we handle and store data, which has, in turn, paved the way for greater innovations in technology. What can we expect from cloud computing as the technology advances? IBM’s Purchase of Red Hat On Sunday, October 28, 2018, tech giant IBM announced […]
-
What Level of Anti-Virus Protection Do You Need?
By Des Nnochiri Let’s be honest; the answer to that question is simple. You need the best level, and if time, money, and factor X were not an issue, every computer in the land would be an impenetrable digital fortress. We could redirect that energy towards something more worthwhile, such as brokering world peace, […]
-
Your Clear, Comprehensive Guide to VPNs
By Des Nnochiri VPN stands for Virtual Private Network, but what does it mean? A physical network allows different machines to be connected to one another in the same room, building, etc. A virtual network allows you to create the same experience. But instead of using reams of cables, it utilizes the […]
-
Tips on Security Risk Assessment
By Des Nnochiri Performing a security risk assessment has become an economic and functional necessity in the digital economy. Cyber-threats and many of the legal and operational aspects of data-handling now constitute as much of a challenge to enterprise success as effective marketing, and continuous service delivery. A strong security posture, responsible data […]
-
The Sound of Silence: Threats from Without and Threats from Within
By Des Nnochiri Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they […]