Press enter to see results or esc to cancel.

Cyber attack warnings highlight need to be prepared

Fresh warnings about the vulnerability of national infrastructure to cyber attacks show the need for securing and monitoring associated control systems connected to the internet. The commander of Britain’s Joint Forces Command has warned that UK traffic control systems and other critical infrastructure could be targeted by cyber adversaries – but industry experts say this …

Continue reading

Tech Network Security in the Age of the Internet of Things

There are a lot of changes taking place in the business world today. One of the things that all businesses need to go out of their way to keep up with is cyberattacks. Most of these target traditionally unconnected devices. As we enter into a new generation of using connected, intelligent devices in the workplace, …

Continue reading

How employee behavior impacts cybersecurity effectiveness

A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links before verifying they lead to a website they intended to visit. Sabotaging corporate security initiatives Whether accidental or intentional, an employee’s online activities can make or break a …

Continue reading

Six years on from the official launch, just how secure is IPv6?

The world launch of IPv6 happened back in June 2012, and World IPv6 Day is on Friday 8 June. But just how secure is IPv6 some six years after that fanfare deployment? The world launch of IPv6 happened back in June 2012, and World IPv6 Day is on Friday 8 June. But just how secure …

Continue reading

8 Questions to Ask in DDoS Protection

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attack. Before evaluating DDoS protection solutions, it is important to assess the needs, objectives, and constraints of the organization, network and applications. These factors will define the criteria for selecting the optimal solution. …

Continue reading