20 August 2014

A number of times now, we have been asked how good Graylisting of emails is as a technique to try and reduce the amount of Spam a company …

14 August 2014

With our Application Control, not only do we have a large library of different applications already recognised, we can also add new applications to that database with considerable …

29 July 2014

We all know that username and passwords are a good idea if you can persuade yourself or your users to use a complex passwords and to use one …

21 July 2014

Great content can be found in all corners of the Internet, but this doesn’t mean all content should necessarily be accessible at work. Sites with a wealth of …

2 July 2014

For those who don’t already know, there is one anti-virus system that can help when you are infected with Cryptolocker.  You do need to install it before you …

26 June 2014

Phishing attacks continued to be prominent in the first quarter of 2014, including the traditional targets of Paypal and Apple, as well as a disturbing new wave of …

10 April 2014

A serious flaw in OpenSSL was announced on 7th April 2014  (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160).  OpenSSL implements the Secure Sockets Layer and Transport Layer Security protocols and is widely used to …

19 December 2013

In 2012, we all became pretty familiar with hackers, getting to know their groups like Anonymous, Lulzsec, and others like them.  The activities of these high-profile hackers have …

19 December 2013

Increasingly, VoIP solutions are under attack.  We see IP PBX’s being targeted by toll fraud, DDoS or being hacked as companies keen to benefit from the undoubted advantages …

19 December 2013

Frequently there is a lot that can be done with existing equipment to improve an organisation’s security posture.  This not only improves general security, it can help an …