ANTI-VIRUS MONTH: Moving from reactive to proactive measures
In the UK as with anywhere in the world, the commercial and public sectors are constantly under the threat of cyber-attacks, making robust cybersecurity measures, including anti-virus solutions, essential. Over the years, approaches to anti-virus measures have evolved significantly among cybersecurity professionals. This evolution is driven by the changing nature of cyber threats, technological advancements, […]
Access online courses to boost your cybersecurity skills
We have a wide selection of online courses tailored specifically for the IT security sector, enabling you to both amass new skills and improve existing ones in 2024 and beyond – start learning today! The IT and Personal Development online learning bundle provides you with over 50 courses, which cover all areas of both professional and personal […]
Is generative AI the next big cyber threat for businesses?
By Robert Smith, Product Manager, Cyber Security at M247 Unless you’ve been living under a rock over the past twelve months, you will have heard all about ChatGPT by now. A shorthand for ‘Chat Generative Pre-Trained Transformer’, the smart chatbot exploded onto the tech scene in November last year, amassing 100 million users in its […]
NETWORK SECURITY MONTH: A decade of evolution to combat networking threats
In an era marked by sophisticated cyber threats, corporate cybersecurity professionals have had to evolve their strategies and technologies to protect organisational assets effectively. Here we delve into the key developments that have shaped IT network security management for cybersecurity professionals over the last decade, informed be attendees at the Security IT Summit… 1. From […]
Health Tech and Personal Data: What ‘Powered by Data’ means for healthcare tech
By Lucy Pegler, partner, and Noel Hung, solicitor, at independent UK law firm Burges Salmon In June 2023, the NHS launched the ‘Powered by Data’ campaign to demonstrate how use of health data delivers benefits for patients and society. The campaign draws on examples of how the responsible use of patient data can support innovation […]
Have you registered for the 2024 Security IT Summit?
Do you have an upcoming security project that you need help with? The Security IT Summit is a bespoke and highly targeted event, where you can meet with a selection of suppliers, who can help with your upcoming business plans and projects. You will be provided with a personalised itinerary of pre-arranged, 1-2-1 meetings with […]
Private wireless networks set for ‘substantial’ growth as demand for security soars
The global private wireless network market is on the cusp of substantial growth, driven by the escalating demand for reliable and secure wireless connectivity across various industries. Against this backdrop, the market is set to grow at a compound annual growth rate (CAGR) of 23.3% from $2.8 billion in 2022 to $7.9 billion in 2027. […]
Choosing Secure Web Hosting Environments: Seven top tips for IT Managers
The security of a brand’s website is paramount. For IT managers, selecting a hosting environment is a crucial decision that significantly impacts security, performance, and reliability. So what are the essential factors? Here are seven to get you started… 1. Security Features The foremost consideration is the security features offered by the hosting provider. This […]
New research from Vanson Bourne highlights cloud security concerns among IT professionals
Nearly all organizations are relying on the cloud to store sensitive data and run critical systems. But for many, cloud security hasn’t kept up. New research from Vanson Bourne surveyed 1,600 IT and security decision makers across eight countries to discover that more than 60 percent believe their organization’s cloud security poses a significant risk. […]
MALWARE MONTH: Devising effective anti-malware strategies
In the complex cybersecurity landscape of the UK, Chief Information Security Officers (CISOs) face the daunting task of protecting their organisations against a multitude of evolving malware threats. An effective anti-malware strategy is essential for safeguarding sensitive data and maintaining business continuity. Here we delve into the key considerations that CISOs must weigh when formulating […]