DROWN Attack Security Warning
A new security vulnerability as been identified in Open SSL that could effect up to 11 million websites or around one third of all computer servers using the HTTPS protocol.
A fix has been identified and is being issued but it will take some time for website administrators to make sure their systems are protected.
Cyber Essentials as the name suggests is a scheme backed by the Government and supported by the IT industry that provides businesses of all shapes and sizes with guidelines on how to protect themselves from Cyber Threats.
Many clients have asked us the pros and cons of an in-house
Put simply Cloud Computing is just computing based on the internet, via remote servers. This means that the power of your computer at home or work has no limiting effect on what software you can use. It also means that rather than downloading and installing programs and applications directly to your computer, they are stored on servers which are accessible through the internet.
Here are 4 key things for you to consider when reviewing your data protection strategy:
As we enter the New Year there is always a rush to establish what we learned from the previous year and report it. 2015 is no exception and a recent report on the
As we start the new year, we’ve been taking a look through the technical press to see what the key predictions are for IT security this year.
We’re all coming up to our Christmas shutdown and so we thought it would be a good idea to recap some suggestions for IT security over the holiday. Here are some important things you need to think about before you lock the door and head off home:
If you’ve recently started having problems with your email and are running Microsoft Outlook 2010 then it may be because they had a product update on the 8th December {December 8, 2015,
It may not be obvious to everyone, until they stop and think about it, but the PC market is contracting. Some news portals are giving figures of a contraction of 11% in the 3rd quarter of 2015.