Shall we give cybercriminals a finger?

05 May 2018 01:42 PM By Trevor - Comment(s)

Passwords and PIN codes are not enough to protect us from cyber attacks. Multi-factor authentication (includes fingerprint recognition) is recommended in all four levels of the Australian Signals Directorate's maturity scale for implementation of strategies to mitigate the impacts of cyber...

Why Cloud Access Security Broker is Critical to Cloud Success

04 Apr 2018 02:11 PM By Alex Chenko - Comment(s)

Organisations today, both large and small are shifting to a cloud strategy to support both their core operations and digital transformation. The question now is not if to move to the cloud, but rather what, when, and how...

Various surveys of organisations indicate that the vast majority of IT profes...

Bomgar Privileged Access Management                                    

19 Feb 2018 02:47 PM By Alex Chenko - Comment(s)

BOMGAR, the leading Remote Support provider, has recently expanded their product offering to include BOMGAR Privileged Access Management. The offering enables security professionals to control, monitor, and manage access to critical systems by privileged users, that may include administrators and th...

Understanding Risks from Insiders

15 Sep 2015 09:41 AM By Victoria Krol - Comment(s)
Better visibility into who has access to company's resources is key to understanding security risks.

Protect sensitive data against internal and external threats

15 Jul 2015 09:01 AM By Victoria Krol - Comment(s)
An oversight of data creation on file shares or external drives by end users exposes organisations to a challenge with understanding where data is stored, how sensitive the content is and who should have access to this data.