Tag "BYOD"

Back to homepage
BYOD/Big Data

BYOD Threats Exposed: 61% of UK SMEs Suffer Cyber-Attacks

Small UK businesses that operate a BYOD policy are more likely to suffer a cybersecurity-related incident, according to new figures from Paymentsense.The merchant service provider polled over 500 small business owners

Hardware/Network

Internet of Things: Who is watching you?

An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says that figure is perhaps

Cloud

Preventing the Cloud from Becoming a Digital Dumping Ground

The Infosec CIA triad of Confidentiality, Integrity, and Availability are just as applicable today as they were many years ago. In recent years, confidentiality has gone out the window as

Mobile

Mitigating Digital Risk from the Android PC in Your Pocket

Security Teams Must Prioritize Risk Mitigation Against Android MalwareFew of us could have imagined that a device that allows us to talk to anyone from anywhere at any time would

Mobile

Businesses suspect their mobile workers are being hacked

More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile Security

Industry Insights

Cybersecurity Is About More Than Reacting to Attacks

Reacting quickly to cyberattacks is a vital aspect of cybersecurity. A prompt response can be the difference between minimal damage and catastrophic data loss.Additionally, cybersecurity experts value the importance of

IT Compliance

Global security trends for 2018: GDPR, identity and access security

In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart card deployment is on the rise,

Hardware/Network

Why Small Businesses Need Enterprise-Grade Security Just As Much As Large Corporations

In 2017, Verizon’s Data Breach Investigation Report revealed 61 percent of all cyberattacks target small businesses. And according to the U.S. Cyber Security Alliance, 60 percent of small business that

Hardware/Network

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of

Hardware/Network

5 Tips For Securing Your Network Printing

Your office printer might not appear to pose much of a security threat. But if left unprotected, it may in fact present a serious risk to your network and resources.For