2019 technology trends: six trends affecting our business and the security sector

    It’s become something of a tradition to write about the key technology trends that we think will have a significant impact on our business over the coming year and the security sector as a whole. Future-gazing is never an easy task, and while many new technologies and broader issues will no doubt be significant in […]

      4 problems with security you didn’t know you had, and how you can solve them

      One way of thinking about your overall security system is as a chain. Each individual link should be strong in its own right, but when they’re all attached, it’s even stronger. However, any chain is only as strong as its weakest link, so if one small part of your security system isn’t working as it […]

        NIS – do your security systems comply with the latest directive?

        Hands up if you’re aware of the Network and Information (NIS) Directive and what it means for your business. Unsure of the details? You’re not alone. The NIS Directive is the first piece of EU-wide legislation designed to boost the overall level of cybersecurity across member states and was launched just a few weeks before […]

          Cybersecurity is a shared responsibility

          Everyone agrees that cybersecurity is important. However, it is also an ongoing process. Nothing man-made is ever 100% secure – intentional backdoors are bad design and show a significant lack of understanding around the basics of a cyber secure world and programming mistakes cannot be avoided completely. Cybersecurity is a shared responsibility, none of the […]

            Preventing intruder access at the front door; halting hacker access at the back

            The rapid evolution of access control technology, specifically its shift from a closed, proprietary system to an open, IP based architecture, has unlocked a new set of possibilities for end users. Modern access systems offer open communications architecture, designed to allow access controllers to be deployed as IoT devices. The benefits are obvious; Access control […]

              How to maintain cybersecurity across all your devices

              Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]