Building Security Into Software
Nov27

Building Security Into Software

Samsung is arguably the world’s number one smart phone manufacturer currently. It releases a new version of its Galaxy series every year. Each new release comes with better and even more advanced features, from finger print readers to iris scanners to voice and facial recognition.

.

Read More
Shadow IT or Stealth IT
Nov13

Shadow IT or Stealth IT

Over the last decade there has been a rapid increase in the number of cloud based services the most common being SaaS. Most of these services are quite useful and easy to set up by even none IT or technical people. Applications such as Asana

.

Read More
How to carry out effective security awareness training
Nov06

How to carry out effective security awareness training

Security awareness training is not a one size fits all or a once-off training issue. More thought and planning should be put into how this training is done because it’s pointless having  a great security policy and procedures in place but employees do not know

.

Read More
Here is how to figure out if the cloud is secure
Oct23

Here is how to figure out if the cloud is secure

The biggest concern we have regarding our data on the cloud is its Confidentiality (who has access to it?), Integrity (how easily can the data be modified?) and Availability (can I access my data whenever I want to). So the million dollar question to ask

.

Read More
How much do you know about Cloud security?
Oct16

How much do you know about Cloud security?

Cloud security is not so much at the tip of everyone's tongue as is Cloud being such a buzz word for the tech savvy these days. Our emails, Facebook data, WhatsApp messages, you name it, are all in the Cloud, but what is this Cloud

.

Read More