Security awareness has grown. So, you would think that MFA has also been implemented in our business lives as well. But, in this annual round up, and reviewing some of the 2022 statistics, it was surprising to see that many companies have yet to implement MFA for access to their business systems.
If you are a global manufacturer with offices and manufacturing facilities around the world, especially in countries such as China and India, ensuring flexible, cost-effective connectivity and application performance can be a particular challenge.
Subscribe to Our Insights
Security awareness has grown. So, you would think that MFA has also been implemented in our business lives as well. But, in this annual round up, and reviewing some of the 2022 statistics, it was surprising to see that many companies have yet to implement MFA for access to their business systems.
If you are a global manufacturer with offices and manufacturing facilities around the world, especially in countries such as China and India, ensuring flexible, cost-effective connectivity and application performance can be a particular challenge.
School of Phish is aimed at organisations of all sizes, with off-the-shelf packages and a free introductory service to suit a range of requirements and budgets.
Is WAN Optimisation still needed now that SD-WAN and SASE are available? Read the blog to learn how SD-WAN, SASE and WAN optimisation can deliver improved performance.
Our final blog in the SASE project guide series looks at what SASE means for SME’s, including why they should adopt SASE and what the best approach is.
In previous blogs, we’ve covered what SASE is along with different scenarios where you might want to consider deploying SASE. After drawing up a short-list of solutions and an outline plan you are now ready to get started with your SASE project!
In the next part of the SASE guide series, we take a more in-depth look at what SASE is and what different vendors are currently offering in the market.
In part 2 of our SASE project guide series we take a more in-depth look at the scenarios that are driving large enterprises and SMEs to adopt SASE as a framework.
What is SASE and when should your company be looking at this new cloud-based approach to networking and security? Find out more in our introduction to SASE blog.
Read tips on the design process, overcoming resistance to change within IT, whether to stick with one or multiple service suppliers and how the SASE architecture can help.
Moving to a Cloud native WAN is not just about monthly cost savings. Read how other benefits, such as productivity and the end-user experience can be enhanced.
Remote working and multi-cloud initiatives are increasing, extending the network perimeter, making it harder to control access to sensitive data. Read how SD-WAN and SASE can be used to build a Zero Trust Network.
Security is frequently quoted as a reason to continue using MPLS. This blog discusses the pros and cons of MPLS in the move to cloud and web services and securing the WAN edge.
The enterprise infrastructure has changed considerably with organisations undertaking digital transformation projects. In this blog, we discuss the future of application delivery – from MPLS to cloud native infrastructure.
As AI becomes an important part of the legal industry, how can it help prevent sensitive data loss in Document Management Systems (DMS) through Machine Learning?
Darran Clare gives his view on the “Data Security and Protection” (DSP) toolkit and the additional opportunities and challenges it presents NHS organisations.
In the midst of COVID-19 and with many businesses adapting to more flexible and agile environments, how do we ensure security of information and how do businesses stay safe in the new data world?
Impact on the global supply chain during COVID-19 has led many businesses longing for more visibility and agility. But how will they create a risk ready supply chain that diversifies supplier regions and builds more agility into the relationships?
What are the options when your high-cost and long-life devices are running legacy operating systems? Organisations without significant capital investment to replace them are facing this reality, which has not gone unnoticed by cybercriminals.
Sensitive data in financial applications is extremely important to keep protected. For users of Xero, there is a free opportunity to utilise 2FA to effectively add a layer of protection. Watch our step-by-step video to learn how.
How can SECOPS teams be expected to effectively analyse, monitor, and improve an organisation’s security posture that extends to multiple environments, without proper data visibility being sent to existing tools?
Cyber threats exposed in May 2020 include multiple vulnerabilities in Google Chrome Browser and new phishing tactics taking advantage of Google Firebase and Microsoft Sway.
Threats and news this month include Microsoft postponing disabling basic authentication, the sectors most likely to fall for phishing attacks and fixes released for a critical vulnerability in VMware vCenter Server.
We discuss challenges we have seen when deploying Multi-Factor Authentication in organisations and how each of them can be assessed individually and resolved.
What is SASE? Read our top 10 SD-WAN and SASE facts and statistics from our recent industry research report to learn more.
As anybody who’s ever configured and monitored a firewall, set up a SIEM programme or spent about 15 seconds in a SOC will tell you, modern security software generates a LOT of alerts and notifications.
Learn from 6 cyber threats in March. Topics this month include NCSC work from home guidance for IT administrator and Microsoft ending support of basic authentication for Office 365.
The FCA and the ICO have had a close relationship for many years. In February 2019, the FCA and the ICO released an updated Memorandum of Understanding, outlining a framework for stronger cooperation between the two parties.
Threats uncovered this month include a malicious email campaign taking advantage of Coronavirus concerns and a WordPress plugin with a critical vulnerability.
Learning from 6 focus business threats from January 2020 that you need to be vigilant for. Read our consolidated monthly threat summary.
Learning from 6 focus business threats from December 2019 that you need to be vigilant for. Read our consolidated monthly threat summary.