Blog

19th July 2016

“Audit” Doesn’t Have to Be a Dirty Word

Isn’t it interesting that a simple word like “audit” can invoke such stress and anxiety? Maybe it’s because HMRC uses the word audit similar to a […]
18th July 2016

What is a Honeypot?

A honeypot is a system, with the sole purpose of attracting potential intruders and recording their malicious activity, that will enable us to further analyse and understand […]
18th July 2016

The Truth about Threats, Vulnerabilities and the Resolution of Cyber Security

”If you think your organisation is not going to be hacked, you will be hacked! The best education you can get is getting your companies hacked […]
17th July 2016

How to Measure the Performance of Your Information Security Program

Any business on any given day can be compromised. That’s the reality of information security. Attacks may be targeted or the result of automated scans. The […]
16th July 2016

Thanks to Cloud Computing, Mobile Device Management Is Here to Stay

Cloud computing is creating vast opportunities for mobile apps development for the mobile workforce. How are businesses responding to this? Digital technologies, mobile devices, and services […]
15th July 2016

Trust Me! Said Every IoT Device

Right now, there are over 3 Billion devices connected to the internet. Most of which, we really don’t want someone hacking into. The number of connected […]