dcsimg

The first steps towards GDPR compliance

The EU GDPR, due to come into effect in May 2018, creates new obligations for businesses that process EU residents’ personal data and allows authorities to impose fines of up to 4% of annual global turnover or €20 million – whichever is higher – for infringements. https://www.youtube.com/watch?v=DPeJc_zfW3M Learn more about Orthology & IT Governance cooperation here … [Read more...]

Stay ahead of the hackers with affordable penetration testing!

Most organisations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. Instead of automatically generated reports from tools that offer generic remediation tips, you need advice from experts who can rank and rate the vulnerabilities so that you can plan remediation in accordance with the risk and your … [Read more...]

The State of Ransomware among SMBs

The following report, conducted by Osterman Research and sponsored by Malwarebytes, presents the findings on ransomware and other critical security issues from more than 1,000 small and medium-sized organizations surveyed in June 2017. Here’s what we discovered. Find out more about Malwarebytes here   … [Read more...]

Turbo.net Containers in Parallels RAS

Parallels Remote Application Server is a comprehensive virtual application and desktop delivery solution that allows your employees to access and use applications and data from any device. By integrating Turbo.net technology, Parallels Remote Application Server (RAS) allows IT administrators to package applications and their dependencies into an isolated virtual environments. Containerized … [Read more...]

5 key changes introduced by the GDPR

There are just over six months to go until the General Data Protection Regulation (GDPR) is enforced. The GDPR will have a significant impact on organisational data protection regimes around the world. With the compliance deadline looming, it’s more important than ever to understand the GDPR and what your organisation needs to do to comply. Read more here about these changes Learn more … [Read more...]

Malwarebytes tracking missed detections in traditional anti-virus

Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren't cutting it. The company examined detection data from nearly 10 million endpoints, and discovered some of the most notable names in the anti-virus industry - even those who rank high in lab testing - are missing basic threats completely. Read more … [Read more...]

Mind these digital crimes and arm yourself against them

Have you noticed that, in this year alone, headlines are inundated with words that contain “cyber”? Cybercrime. Cyberattack. Cybersecurity. Cyberwarfare. The cyber. (Okay, that was last year.) Frankly, with so much going on, we hardly remember a time when the term “cyber” seemed quaint and a little retro. Read more here … [Read more...]

Best Practices for Keeping Active Directory Clean

With Active Directory being such an important part of your IT security, can you really afford to leave it in a dirty state any longer? It happens in many organizations; over time your Active Directory database becomes cluttered with old data or inactive accounts, and this can lead to structural infractions and convention discrepancies. Read more here … [Read more...]

GFI Software strengthens email security for SMBs with the launch of GFI MailEssentials v.21

GFI Software, the leading provider of security and communication solutions unveiled today new antivirus (AV) engines Cyren and Sophos for GFI MailEssentials v. 21, the award-winning email security gateway. The AV engines in the latest release bring improved ability to identify and contain intrusion through email messages, better protecting small and medium-sized businesses. Read more here … [Read more...]

Basic Principles for Securing Active Directory

Many organizations rely on Active Directory for centralized control over their resources. However, in our experience, a vast majority of these companies rely only the in-built security settings of Active Directory when it comes to preventing attacks and data breaches. This is simply not enough in today’s world. Learn more here … [Read more...]