CATEGORIES

Resources

The protection of personal data in a teleworking situation

The COVID-19 pandemic has brought about drastic changes at a social level that would have been difficult to imagine a few weeks or months ago. The situation of confinement in which many countries find themselves, with most of the population unable to leave their...

Simplifying cloud access with SSO

As enterprises adopt cloud applications, users are plagued with password fatigue--the never-ending burden of creating and maintaining separate identities and passwords for the multiple cloud and web apps they need to access on a daily basis. Adding to the frustration...

The value of identity

The rapid digitisation across the world in 2020 has paved the way for companies to adopt new models in how they secure and manage the identity of their users. As businesses move from largely reactive measures last year to now putting in place policies and processes to...

5 Cyber Security Tips for Remote Working

After the issuance of movement restriction policies by the government to avoid the spread of coronavirus, organizations had no choice but to send people home. Most were in a hurry to get people up and working from home such that most resulted in advising some people...
GDPR and data security

GDPR and data security

The General Data Protection Regulation (GDPR) is the most significant overhaul of European Union (EU) data protection legislation in over 20 years. Amongst other things, it is intended to provide...

read more
Most common Security Vulnerabilities

Most common Security Vulnerabilities

Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. The move to remote-first has underlined the increasing reliance on cloud and web technologies while...

read more
Protecting your passwords

Protecting your passwords

Attackers use a variety of techniques to discover passwords, including using powerful tools freely available on the internet. The following advice makes password security easier for your users –...

read more
Simplifying cloud access with SSO

Simplifying cloud access with SSO

As enterprises adopt cloud applications, users are plagued with password fatigue--the never-ending burden of creating and maintaining separate identities and passwords for the multiple cloud and web apps they need to access on a daily basis. Adding to the frustration...

The value of identity

The value of identity

The rapid digitisation across the world in 2020 has paved the way for companies to adopt new models in how they secure and manage the identity of their users. As businesses move from largely reactive measures last year to now putting in place policies and processes to...

5 Cyber Security Tips for Remote Working

5 Cyber Security Tips for Remote Working

After the issuance of movement restriction policies by the government to avoid the spread of coronavirus, organizations had no choice but to send people home. Most were in a hurry to get people up and working from home such that most resulted in advising some people...