Three steps to create secure instant messaging within your organisation

Instant messaging (IM) applications are now a given in the modern enterprise. In fact, according to this article in Wired magazine, they are almost as old as the Internet itself!  It’s easy to see why instant messaging applications are popular - they are quick to use, less formal than email and allow for instantaneous communication.  Users can see immediately when their colleagues are online, share files quickly and...

By Jan van Vliet, 19 October 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.