-
Recommended
Crisis control: how to recover from a data breach
A clear recovery strategy can help businesses minimise the damage from a cyber attack and come back more resilient than before.
3 min read
-
Your employees are the biggest risk to your business
The rise of Bring Your Own Device means the biggest threat to business could be staff devices. What do the experts think?
7 min read
-
Recommended
5 Game of Thrones quotes about printer security
George R.R. Martin’s “A Song of Ice and Fire” saga is practically a cautionary tale of “danger is everywhere; you’re never safe.” And while as an IT manager you may not be defending your office from White Walkers or Wildlings, having a stout defense and vigilant guard are key to protecting your kingdom.
2 min read
-
Recommended
Security at your fingertips. Or face and iris…
Today, cybersecurity is at your fingertips – or in your fingerprints, to be precise.
4 min read
-
How secure is your network printer?
Your printer might not be an obvious target for cyber criminals but if you’re using it to print sensitive data or it’s on a network then you’re going to want to check this guide out.
2 min read
-
The day the internet died: DDoS attacks strike again
The internet is under threat from increasingly sophisticated DDoS attacks – but what makes them so powerful and what will the hackers do next?
2 min read
-
How Business Mobility impacts IT security
Mobility can boost productivity and change the way your business runs for the better… but how can IT provide the benefits while negating the risks?
View Infographic
-
Why adopting the hacker mindset can make your company more secure
Cyber security is one of the major issues keeping chief executives awake at night. Breaches are on the rise – and likely to cost $2.1 trillion worldwide by 2019, according to Juniper Research.
3 min read
-
Recommended
BlackNurse: The cyber attack that can take out a business in one hit
Researchers have discovered a new Denial of Service (DoS) attack that can disrupt an entire network – all from a single laptop. Meet BlackNurse.
2 min read
-
The anatomy of an unsecured printer
Is your printer afflicted with insecurities?Not psychological ones - we're talking about aspects of your printer that are potential causes of network or information breaches.
View Infographic
-
Recommended
The impact of BYOD on IT security
BYOD is transforming the way employees are working, but what’s the potential impact on your IT Security?
View Infographic
-
Recommended
Mind the printers: How to close the security gap
Ever wondered how a hacker would exploit the printers on your network? We asked one to find out.
5 min read