Cloud security policy: The questions you need to ask

What would your reaction be to someone who told you that “The Cloud” is so secure you don’t need to do anything else to protect your data? I would hope that your reaction would be somewhere between the RCA Dog head tilt and Dramatic Chipmunk. But from anecdotes I’ve been hearing, this gem of very questionable advice is … More Cloud security policy: The questions you need to ask

Cloud services: What to consider when migrating your infrastructure

I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware that will later become obsolete or … More Cloud services: What to consider when migrating your infrastructure

Say Hello to ESET Endpoint Encryption

ESET  introduces its rebranded product ESET Endpoint Encryption to audiences at the 2017 Gartner Security & Risk Management Summit in London. Following a two-year transition following the acquisition of recognized data encryption company DESlock Ltd., ESET is boosting its brand building activities by fully adding the renowned solution under the parent brand. ESET Endpoint Encryption is a … More Say Hello to ESET Endpoint Encryption

Hackers can control damaged phones using replacement screens

Replacement screens for cracked smartphones bought from third party vendors could leave you vulnerable to hackers, a new study has revealed. The research, carried out by Israel’s Ben-Gurion University of the Negev, has shown how hackers can use replacement screens to override and steal data from the refurbished phones. Worryingly for users, the attack on these … More Hackers can control damaged phones using replacement screens