An estimated 70% of breaches start on end point devices (laptops, mobiles, workstations, servers). When users and endpoints are off-network, antivirus is often the only protection available. Signature detection and…
It can no longer be acceptable for Chief Executive Officers to deny all knowledge when it comes to responding to cyber security attacks. As consumers expect and demand protection of…
After over three years of discussion at many levels, the new EU data protection framework has finally been agreed. It takes the form of a Regulation – the General Data…
Cyber Security is a challenge faced by organisations of all sizes today regardless of the nature of their business……and security breaches are a case of ‘when’ not ‘if’. However, scaremongering isn’t…