5 myths of virtualization security

Virtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack. It’s vital that you are […]

Securing your passwords

Whether it’s an online account, a computer log in or network access, passwords are used to prevent unauthorized access. But far too many people choose weak and easy-to-guess passwords putting themselves at the risk of cyber attack. Don’t fall into the trap of these cyber criminals. Secure your perimeters and never let anyone access your […]

The ultimate guide to defense in depth

Even the most reliable business network security and sophisticated user credentials can be vulnerable to cyber attacks to some extent. The concept of a comprehensive layered security, called defense in depth, is based on a strategy which has been around since the time of the Romans. A multiple-layered defense is created to prevent the advancement […]

Security – 4 threats in 2014

With each new year comes resolutions, goals and trends. One popular goal of many small businesses is to ensure that their systems are secure for the year to come. Often, the first step to take is to look at current trends, but when it comes to security, you should be looking at threats.

Data collection and the NSA

China is commonly thought to be the opposite of the US, but for one city: Hong Kong. Hong Kong is arguably one of the freest societies on Earth, and has recently been the refuge of one of America’s biggest whistleblowers. In early June, Edward Snowden, an ex NSA (National Security Agency) consultant exposed data collection […]

50 million LivingSocial accounts hacked

Cyber crime has been around since the very early days of the Internet and has it has become an increasingly serious problem as the number of Internet users has increased. This trend is likely to continue, and you can be guaranteed that you’ll continue to see news about websites being hacked and valuable information exposed. […]

Watch out for tech support phone scams

For users of Windows systems the threat of a security breach is an ever-present one that has many security experts constantly worrying. The thing is, many systems are secure enough from outside attacks, and many scammers know this. As a result, scammers have switched tactics and have taken to masquerading as Windows technicians, hoping to […]

Do you have a social media policy?

When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the majority of attacks. The major problem with this is that many don’t look beyond what they already do, and this is where security issues can harm them. One such security threat comes from social media. […]

Admin access to systems could be trouble

Security of technical systems and devices used in the office environment is an issue that is important to many companies. Businesses often go to great lengths to ensure that their systems are secure from external threats, yet often fail to take into account inner threats. One of the most common inner security threats is that […]