Last year saw a range of headline-grabbing computer hacks that brought devastation, bad publicity and, in some cases, severely affected company share prices. As predicted, there were more high profile security breaches in 2015 than ever before. Increasingly...
Posts from...
OtherWhat You Need to Learn from Hillary Clinton’s Email Debacle
The Hillary Clinton email story probably looks arcane to outsiders, but for IT professionals, it’s enough to make them break into a cold sweat. Primarily because they all know just how easily it could happen in their organization too. I’m pretty sure most of us have...
Introducing Stop Source Code Theft — The Online Hub for Source Code Security
As a CEO or CTO, you know that your source code is an important part of your competitive advantage and a highly strategic aspect of your company’s innovation and place in your industry. In 2018, there were around 2.9 billion data records breached. Perhaps the most...
4 Foolproof Ways To Catapult The Productivity Of Employees Who Are On The Road
It's no secret that keeping tabs on your team when they’re outside of the office can be a challenge. Despite the fact we live in a digitally connected world, a lot of business still has to happen face-to-face. For many employees - from sales to development and...
Old School Becomes New to Create Better Cybersecurity
The site of a World War II code-deciphering operation in the UK is training the youth of the nation in cybersecurity, creating a new force for hackers to reckon with. Bletchley Park in Buckinghamshire, UK, has become the site for a new wave of cybersecurity experts in...
It’s Easier Hacking a Human Than a Computer – a Hackers Guide to Protecting Your Data
In a recent interview with Computer World, infamous hacker Kevin Mitnick shared his advice on how to protect data. Most of it is surprisingly simple tips on how to avoid so-called ‘social engineering’. It’s a clear warning to take security seriously... Be smarter with...