+44 (0)203 88 020 88

Menu

Search

Articles

What are software supply chain attacks?

Software Supply chain attacks – do you know what you are importing? Many websites and applications routinely import additional code modules from external repositories.  These could be javascript libraries for a webpage or source code for an application. Two recent incidents illustrate the risks of supply chain attacks against the code of your applications and […]

What are software supply chain attacks? Read More »

cloud storage

Does your organisations data lurk in the shadows?

“Shadow IT” (also known as “Stealth IT”, “Client IT” or “What have those eejits in marketing done now?”) is the term used to describe IT systems which are developed and owned by business teams outside of the control or jurisdiction of an organisation’s IT department.  Usually initiated with pure intentions, these systems can pose a

Does your organisations data lurk in the shadows? Read More »

software updates

Security Patching – The Stuff of Sys Admin Nightmares

Security updates and patches can literally be thing of nightmares for many Systems Administrators. To patch or not to patch – that is always the question. From a security perspective, security patches should always be applied to increase the organisation’s resilience to hackers and malware, but with many organisations lacking IT resources and having ever-decreasing

Security Patching – The Stuff of Sys Admin Nightmares Read More »

0

No products in the basket.

No products in the basket.