Posted on 11 December 2018 by
There are officially more IoT devices than humans in the world. And by 2020, there will be twice as many of them than us. And according to a recent study by Gemalto1, 90% of consumers said they don’t have confidence in IoT security. Furthermore, the study found that only 50% of companies have adopted a “security by design” approach, and more than half of consumers have concerns about their IoT devices being hacked or their data stolen.
Posted on 20 November 2018 by
The digital transformation is upon us and managing and securing an ever increasing number of devices and complexity of technologies can prove to be a huge challenge for enterprise IT. Having more digital assets leads to major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. Many managed service providers have recognized this as an opportunity and are building business plans and service strategies to help their customers.
Posted on 18 January 2018 by
Ransomware is a form of malware that takes hostage of systems, either by locking the user out completely, or locking files so they can’t be accessed. In 2017, we saw a huge increase in ransomware including WannaCry and NotPetya, two massive global attacks. Large companies including HBO and KQED were also attacked.
Posted on 19 December 2017 by
PKI is a security ecosystem used by enterprises, defense and governments. Regulations, increased use of cloud-based services and the Internet of Things (IoT) are prompting a recent surge in PKI adoption.
Posted on 15 November 2017 by
The deadline to comply with the Payment Card Industry Data Security Standard (PCI DSS) is upon is. Organizations that handle branded credit cards from the major card providers are scrambling to determine what is required and how to get there. Are you ready for PCI DSS 3.2?
Posted on 17 October 2017 by
An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals. Are you ready?