Why your organisation needs the password police

By Steven Hope, CEO of Authlogics We live in a world full of policy, etiquette, regulation, and law, that provides a written and sometimes unwritten framework for codes of conduct that are deemed acceptable or unacceptable in our society. However, having rules in place does not guarantee compliance. It is for this reason that we […]
Only 8% of global tech workers have significant cloud-related skills

75% of tech leaders say they’re building all new products and features in the cloud moving forward, but only 8% of technologists have significant cloud-related skills and experience. Additionally, 64% say that they are new to cloud learning and are looking to build basic cloud fluency. That’s according to Pluralsight’s 2022 State of Cloud Report, which […]
49% of UK organisations experience high-business-impact outages at least weekly

With cloud adoption, cloud-native application architectures, and cybersecurity threats on the rise, the biggest driver for observability in the UK was an increased focus on security, governance, risk and compliance. That’s according to New Relic’s second annual study on the state of observability, which surveyed 1,600+ practitioners and IT decision-makers across 14 regions. Nearly three-quarters of respondents said […]
Investing in a phishing prevention toolkit

Phishing remains one of the biggest security threats to all businesses – regardless of size and industry. This was reflected in the Cyber Security Breaches Survey 2021, as phishing was identified as the most common type of security attack (82%) last year. The accelerated shift to hybrid work environments, triggered by the COVID-19 pandemic, has […]
Network protection in the hybrid era

By Gary Cox, Director of Technology Western Europe at Infoblox Since emerging from the worst effects of the pandemic, a mix of in-office and remote work has become common practice for many organisations. Initially seen as a temporary way of easing employees back into the workplace after almost two years working from home, it appears […]
UK university students at risk from email scams, says report

Research has found that none of the UK’s top 10 universities actively block fraudulent emails from reaching recipients. Proofpoint has released data identifying that 97% of the top universities in the United Kingdom, the United States and Australia are lagging on basic cybersecurity measures, subjecting students, staff and stakeholders to higher risk of email-based impersonation attacks. […]
Growing demand for future-proof mobile solutions for access control

With convenience being a major theme, 42% of respondents worldwide indicate plans to upgrade to mobile-ready systems. That’s according to the latest State of Access Control report produced by IFSEC Global in partnership with HID Global, which surveyed just over 1,000 respondents from across North America (56%), EMEA (29%) and Asia Pacific (15%) to detail […]
Sail the digital transformation seas more securely with Zero Trust Access

By Tim Boivin, PortSys (pictured) Security has long been the boat anchor that drags down innovation – a deadweight that prevents digital transformation efforts from sailing to success. With the pandemic, digital transformation efforts accelerated far beyond the horizon of what was thought possible. Those changing tides also gave cyber pirates the opportunity to hack […]
Just Say Yes – Why CISOs must now embrace SD-WAN

Digital Transformation has become a business imperative, yet rather than pulling together to enable essential change, the friction between network and securityteams is increasing. The business needs to move away from data centres and traditional Wide Area Networks (WAN) to exploit the cost, flexibility and agility provided by the cloud and Software Defined WANs (SD-WAN). […]
Just one crack – That’s all a hacker needs…

By Michael Oldham, CEO of PortSys, Inc. Just one crack. That’s all a hacker needs to find to cripple your organization. Here are three essential steps to take to stop that crack from blowing your infrastructure wide open for bad actors: Multi-factor authentication (MFA) that includes device validation, certificate checks, Geo IP intelligence and other […]