What is the appropriate security to meet GDPR?

GDPR or the General Data Protection Regulation is a set of rules that requires business organisations to protect personal and sensitive data. It also requires the maintenance of the privacy of EU citizens for transactions occurring across the EU states. The non-compliance or compromise of the information can be subject […]

Read more

Getting The (Security) Message Across to The Board

Introduction In any organization or business, security breaches can occur at any number of points in the operational-cycle, where personal detail or information is shared. There is no denying the fact that, security threats can be posed by cybercriminals, or employees, or even systems. It is hardly a surprise that […]

Read more

Why Security Is A People Problem?

Introduction In recent years, some of the largest data breaches have been a direct result of human error, security is a people problem. The consequences of these events are often unintended losses that are caused by people who mistakenly activate malware by opening unknown emails or clicking on malicious links. […]

Read more

SD-WAN VS MPLS And Which One Is Better?

Introduction Every day, businesses are becoming more globalized. The critical business traffic is increasingly routed around the offices by acquiring completely unacceptable packet loss. The network architecture which was built a way back is now no longer accepted by the global businesses. To meet the requirements of global enterprises, it […]

Read more

Demonstrating Security Value

When it comes to explaining the importance of security to leadership and to justify any investments that come along with it, no matter how important such issues are, CISO’s often struggle with it. It is hard to in-still security standards into the more extensive plan of action, despite the fact […]

Read more
Security Culture

Security Culture

How “Security Culture” Affects an Organisation’s Risk of a Potential Breach Over the last 2 years announcements by Marriott, British airways, Travelex and now EasyJet on how their systems were compromised and breached by nefarious actors this must now have every business large, small or enterprise thinking about its current […]

Read more