Twitter icon Linkedin icon
CALL: 01777 852222

Browsing Category "Blog"

Wanna Cry Monitor

Published:

Ransomware – Don’t Become the Next Victim. #WannaCry

Ransomware has become a major threat and high risk to many individuals and organisations worldwide. It is a very destructive variant of malicious malware that impacts systems and makes critical files and sensitive information inaccessible until a ransom is paid.


Vulnerability Review 2017: At a Glance

Published:

Vulnerability Review 2017: The Facts At A Glance

An insight into the Flexera Software Vulnerability Review 2017 put together by the experts at Secunia Research team. The report analyses a representative portfolio of the 50 most common applications found on endpoints, including both Microsoft and non-Microsoft software.


Closing the Gaps in End-User IT Security

Published:

Closing the Gaps in End-User IT Security

As an IT security reseller, you do much more than take a portfolio of products to your customers. You’re a source of expertise – a trusted advisor who understands the challenges businesses face and the best strategies to overcome them.


How Four Eyes Fits with Cyber Security

Published:

How Four Eyes Fits with Cyber Security

In Privileged Account Management, your goal is to allow administrative access wherever it is required, without losing your overall governance and visibility. And the four eyes principle is, with the right technology, the perfect fit.


What GDPR Means For You Post-Brexit

Published:

What GDPR Means For You Post-Brexit

As we move to our EU exit, it’s tempting to wonder if one of the biggest challenges for IT security – the General Data Protection Regulation, or GDPR – has conveniently disappeared.


A PCI-Compliant Approach to Privileged Passwords

Published:

Privileged Passwords and PCI-Compliance

Network perimeter security is just one part of being PCI compliant. It also covers how to handle accounts and privileged passwords, and their auditability.

How does Thycotic fit in?


The Evolution of DDoS

Published:

DDoS Mitigation. Evolved.

DDoS attacks have evolved. The way we use technology has evolved.

It’s time for DDoS mitigation to change in the same way. It’s time for DDoS Mitigation 3.0


15,000 vulnerabilities in 2014

Published:

15,000 vulnerabilities in 2014

How many affected you? Vulnerabilities are a real threat to your security. Get the best vulnerability intelligence with Flexera Software’s Vulnerability Review 2015