Cyber-criminals unfortunately continue to up the ante of their attacks and in many ways, are adapting faster than the good guys
Is Azure More Secure Than AWS
The move to cloud continues to grow at pace, with most IT departments looking at Azure and AWS as the two the main options to consider. For each individual use case, there will be a number of requirements to consider including what applications will be deployed, existing skill base and cost. We would hope that security …
What Is DevSecOps And Do I Need It
As new security threats continue to emerge, it can be a challenge to stay on top. In an agile environment
IT Directors Introduction to Microsoft Azure Security
Concerns about cloud security are not likely to diminish anytime
Six Steps to Securing the Cloud
The lack of an ‘edge’ that clearly defines the cloud environment that your organisation is considering sending your data to, can
Data Protection – GDPR Checklist
The General Data Protection Regulation (GDPR) requires that, by 2018, any company that wishes to do business in the EU, will need to collect, store and use personal information more securely. Companies that have not started addressing this yet will, potentially, have a lot of the compliance work to get through in 2017. With the …
2016 Cyber Security Trends Summary
The majority of UK businesses now recognise the importance of cyber security. This, in part, has been driven by the fact that E-commerce has become much more important to UK companies and has doubled since 2008. Added to that, media coverage of high-profile breaches and their consequences has moved cyber security up the corporate agenda. …
Ten Basic Network Security Recommendations
Krypsys experts offer advice on a daily basis to network administrators so that they can better secure their companies’
New Password Rules from NIST
As things stand, passwords are still the cornerstone of user security. But, with so many passwords to think up and remember
Barracuda Web Application Firewall Review
The Barracuda Web Application Firewall (WAF) offers complete protection from application-layer distributed denial-of-service
Implementing and Extending Your ISO 27001 Scope
The good news is that most organisations these days have some form of security controls in place. There will probably be a firewall, even if it’s the one provided by the ISP which is integrated into the wireless router. There will probably be some anti malware software in place, even if it’s some kind of …
7 Simple Smart Phone Security Tips
This article features 7 simple smart phone security tips that can easily be implemented by you, your co-workers, friends and
PCI Pen Test Requirements Can Cause Confusion
Business IT Teams will almost certainly be aware of the importance of finding security vulnerabilities within the company’s
Five Top Wifi Security Tips
Wireless technology can make intrusion attempts easier because the attacker does not need physical access to the network
You Can’t Just Rely on Your Anti-Virus Solution
An antivirus solution is now a standard fixture in the IT security arsenal of any serious IT shop. It should allow the system to scan static files on disk and also programs that are resident in memory for suspected malicious activity. This is clearly good practice and is, indeed, a basic essential, but attackers that …