BY JOSHUA WOOD, DECEMBER 1, 2017
SECURITY

Taking the first step towards IT security: Where to begin

In my previous post, I wrote about some of the many reasons why IT security is vitally important for businesses today. Now I want to look at some of the challenges that companies will face, and some of the technological solutions they will need to consider when deciding to improve IT security. Two considerations before you begin: Let’s say that the executive leadership of a company decides that IT security needs to be more of  …>> more

Reducing Cost, Increasing Flexibility, and Facing Future Threats: VMWare NSX and the Virtualized Network

It is often difficult for companies to understand and appropriately react to paradigm shifts that require radically different thinking. For technology companies, having the flexibility to react appropriately when a paradigm shift presents itself is absolutely critical. Apple’s move into mobile, and Microsoft’s move into cloud services are both examples of this. Whether your company is web facing with a large online presence, or a regular bricks-and-mortar business, technology is involved. From employee workstations, to  …>> more
BY JOSHUA WOOD, OCTOBER 11, 2017
SECURITY

IT Security: The door you didn’t know was open

As an IT security professional with many years in the business, I can’t remember a time when IT security has been as crucial to the success and survival of businesses. No matter how good a business thinks its IT security is, the bad guys have figured out how to pick the locks. According to Bob Martin from CISCO Systems, “With breaches at more than 13 retailers and a number of unknown breaches that were never  …>> more
BY HARRY ZAREK, JANUARY 17, 2017
CLOUD COMPUTING, SECURITY

Empower users or protect assets? We shouldn’t have to choose.

Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our internal IT environment, we manage access to applications and data in a formal way. But when our staff go out to the internet, we can’t restrict where they go. We have an “honour principle” that they will go only to business relevant sites. But  …>> more
BY JOE ADDISON, APRIL 8, 2014
SECURITY

5 things to do if you’re still running Windows XP

If all goes according to plan, today will be the last Patch Tuesday for Windows XP and Office 2003. And while rumours still abound that Microsoft will back down and offer a low cost support option, I’m not holding my breath. However, there are still some legitimate reasons why you may still have Windows XP running in your environment. There may be a critical application that won’t run on anything other than XP and the  …>> more

Healthcare security isn’t a sexy topic, but we need to talk about it

In a healthcare setting, there’s no doubt that security matters because hospitals deal with sensitive patient data. The only time we hear about data security in healthcare is when something goes wrong, like when there’s a data breach and personal information is accidentally (or maliciously) released into the wild. Security expert Chris Poulin has calculated that more that 24 million electronic patient health records have been compromised between 2009 and 2013, with a significant amount  …>> more