IT Defense In Depth Part I

In All by Mike Abbott

    In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an …

Data Security: A People Problem

In All by Mike Abbott

    Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there …

What is Ransomware and How Can it Affect Your Business?

In All by Mike Abbott

    This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the …

Data Breaches are a Question of When, Not If

In All by Mike Abbott

  You hear on the news all of the time about big cyber attacks on large corporations, and even government agencies. The trouble with this news coverage is that is …

New Chip Flaw

In All by Alex Kallimanis

At the start of 2018 the whole of the Information Technology sphere was worried about a potential data breach. Devices ranging from smartphones to servers could be affected due to …