Posted on 03 September 2019 by
Is Two Factor Authentication a Waste of Time? Not All MFA Methods are Created Equal Over the past few years, people have been advised to replace the passwords they use to access cloud services, with two-factor authentication or ‘two step verification’. This is because the majority of data breaches to cloud services are the result […]
Posted on 28 August 2019 by
The arrival of 5G has heralded a new era for the gaming industry and gamers alike – we explore some of these developments.
Posted on 27 August 2019 by
Thales’ Managed Services program was recognized at the MSP Innovation Awards, powered by Channel Partner Insight (CPI), earlier this summer in New York City. The MSP Innovation Awards are designed to honor the vendors, distributors and MSPs across North America who are leading the way in managed services at a time of unprecedented disruption and change in the channel.
Posted on 14 August 2019 by
Since Australia’s Notifiable Data Breaches (NDB) scheme launched on the 22nd February 2018, the Office of the Australian Information Commissioner (OAIC) noted that there were 964 data breaches reported between 1 Apr 2018 and 31 March 2019. With cyber-attacks unwaning, it is not surprising to see that the Australian Prudential Regulation Authority (APRA) released its Prudential Standard CPS 234 for Information Security on 1st July 2019.
Posted on 06 August 2019 by
Every enterprise understands the need for security, but recent transformations in the business ecosystem are increasing the urgency to implement strong and transparent security processes. At the same time, these transformations are shifting how this security must be delivered. This is where code signing can add security and peace of mind to both the Enterprise and their customers.
Posted on 05 August 2019 by
The British parliament has been unable to agree the exit package from the European Union. With the possibility of a “no deal” departure looming, EU leaders have granted a six-month extension to Brexit day. But the uncertainty that still lingers with regards to Britain’s future, creates various opportunities which cyber criminals could try to exploit.