Physical security and cybersecurity – are they so different?

    Large organizations will typically have a physical security team and a separate IT team focused on cybersecurity.  Both teams protect the organization’s assets and resources.  So it is natural that one may think that this would make them great friends. The challenge is that the assets and resources are different.  Protection is an obstacle designed […]

      Are retailers doing enough to secure their customer data?

        Retail is constantly transforming, with self-service checkouts, the unmanned grocery store and ‘click and collect’ providing prime examples of the innovative ways in which technology has enhanced retail operations. Yet the systems that sit behind this frictionless shopping experience, with their complex layers of customer data, present a compelling and valuable target for cyber […]

        NIS – do your security systems comply with the latest directive?

        Hands up if you’re aware of the Network and Information (NIS) Directive and what it means for your business. Unsure of the details? You’re not alone. The NIS Directive is the first piece of EU-wide legislation designed to boost the overall level of cybersecurity across member states and was launched just a few weeks before […]

          Keep your cyber-door locked

          Locking the door is the first rule for a safe home. However, when it comes to cybersecurity, you may be leaving your system’s entrance open to malicious users. Over the last decade, the importance of data – and what can be done with it – has led to a new breed of cyber criminals. No […]

            How to maintain cybersecurity across all your devices

            Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]

              Data center protection: Five fundamental steps

              Companies all over the globe rely more and more on data to improve their performance and revenue. This has made data centers crucial infrastructures, but also mouth-watering targets for cybercriminals. The increasing value of information has made data centers a prime target for nefarious intentions, from criminals stealing data for profit, to individuals wishing to […]