Category: Security

  • 7 Cyber Security Tips for Small Businesses

    7 Cyber Security Tips for Small Businesses

    Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you’re a small business without a big security budget, […]

  • What’s Next for Cloud Computing?

    What’s Next for Cloud Computing?

    By Des Nnochiri Over the last decade, cloud computing has revolutionized the way we handle and store data, which has, in turn, paved the way for greater innovations in technology. What can we expect from cloud computing as the technology advances? IBM’s Purchase of Red Hat On Sunday, October 28, 2018, tech giant IBM announced […]

  • What Level of Anti-Virus Protection Do You Need?

    What Level of Anti-Virus Protection Do You Need?

    By Des Nnochiri   Let’s be honest; the answer to that question is simple. You need the best level, and if time, money, and factor X were not an issue, every computer in the land would be an impenetrable digital fortress. We could redirect that energy towards something more worthwhile, such as brokering world peace, […]

  • Your Clear, Comprehensive Guide to VPNs

    Your Clear, Comprehensive Guide to VPNs

    By Des Nnochiri   VPN stands for Virtual Private Network, but what does it mean?   A physical network allows different machines to be connected to one another in the same room, building, etc. A virtual network allows you to create the same experience.   But instead of using reams of cables, it utilizes the […]

  • Tips on Security Risk Assessment

    Tips on Security Risk Assessment

    By Des Nnochiri   Performing a security risk assessment has become an economic and functional necessity in the digital economy. Cyber-threats and many of the legal and operational aspects of data-handling now constitute as much of a challenge to enterprise success as effective marketing, and continuous service delivery.   A strong security posture, responsible data […]

  • The Sound of Silence: Threats from Without and Threats from Within

    The Sound of Silence: Threats from Without and Threats from Within

    By Des Nnochiri   Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions.   However, what is particularly notable about this group is they […]

  • Here’s How to Stop Google from Tracking Your Phone – For Real This Time

    Here’s How to Stop Google from Tracking Your Phone – For Real This Time

    By Des Nnochiri   We all know Google wants to be in all our business. Whether we’re shopping, streaming, searching, or taking a stroll, Google is gathering vast amounts of data on us through our ubiquitous smartphones and other connected devices.   However, up until recently, you may have thought that if you disabled your […]

  • GDPR Compliance Auditing Tips

    GDPR Compliance Auditing Tips

    By Des Nnochiri    Now that the General Data Protection Regulation (GDPR), drawn up by the European Union (EU), has finally come into effect, many of the affected organizations have been scrambling to keep up with the auditing and operational requirements of a compliance regime that’s widely recognized as one of the most stringent and […]

  • Are You Up to Speed on the Big Star Labs Security Threat?

    Are You Up to Speed on the Big Star Labs Security Threat?

    By Des Nnochiri   The way apps and extensions can gather data on people has been drawn into sharp focus recently. While many people accept sacrificing a certain amount of privacy as the cost of a free-at-point-of-use internet, some companies clearly have been willing to cross the line into intrusion and manipulation.    The first […]

  • The Connected Home – How Secure Are All These Gadgets?

    The Connected Home – How Secure Are All These Gadgets?

    by Des Nnochiri   Connected or smart homes are becoming more commonplace as people use computer networks to control different aspects of their in-house technology. But how secure are these networks? Everything Online A connected home allows occupiers to remotely control and monitor their in-house technology via their smartphones and tablets and its uses can […]