Security
The cyber security threat landscape is constantly changing with the ever growing number and scale of attacks. The consequent measures necessary to combat the threats need to be robust, comprehensive and agile. Simply put, it is about developing an effective approach and constantly testing and refining it. The sections below cover the first 5 sections […]
Technology continues its pace of lightning fast evolvement – and whilst security systems, tools and techniques continue to become ever more advance, so too do the tactics and tools of the IT criminal underworld. To underline and startlingly emphasise this point, we look to the latest UK Government’s report into business security breaches – which […]
In the digitisation age, data increasingly is becoming ‘the business’ and hence the pressure to protect data and users from more sophisticated attacks calls for new more effective ways of cyber protection. Statistics show that the battle to protect data is not heading in the right direction, unfortunately, according to Gartner the number of breaches are increasing as are the average number […]
As Security continues to be a major area of focus for business executives and managers we continue to develop services in this area to address these needs. To this end we have teamed up with Comstor and Cisco to offer Security Assessments that give a comprehensive view of real time security threats. The service also […]
NetworkIQ has recently recertified as a Cisco Select Partner in UK. This is our 7th straight year of Cisco certification and we are looking forward to extending the range of specialisations in key technology areas. Security Assessment As Security continues to be a major area of focus for business executives and managers we continue to […]
As the cloud becomes the backbone of the digitisation era we review what this means in terms of securing this emerging complex puzzle of users, data and applications. The interconnected world where access to business IT is expected anytime from anywhere poses different challenges than those previously faced by business leaders and technical teams. While […]
Digitisation has meant the wholesale adoption of cloud services. We are going to cover 5 key cyber security elements to help your business navigate the changing IT landscape. These elements are; Automation Lifecycle Approach Integrated Systems Layered Architecture Insight and Analytics Digitisation is solving problems, creating opportunities and rewriting the way in which your business […]
Time to detection, or TTD, is the window of time between the first observation of an unknown file and the detection of a threat. The industry average TTD is 100-200 days meaning many undetected cybercriminals have in excess of 100 days on average to do damage to a compromised business. In many instances businesses are […]
In our last blog post we looked at various web attack methods, threat updates and where cyber criminals were focusing their efforts. In part 2 of this series based on the 2016 Cisco Annual Report we want to focus on 3 main areas that are being exploited – Data encryption, WordPress web sites and the […]
In the first part of this blog series on the Cisco Annual Report we take a look at the methods attackers are using to infiltrate organisations and what sectors and geographical locations are being targeted. The vulnerability of small and medium sized enterprises (SMEs) to sophisticated attacks on their IT structure is growing. These attacks […]