New developments, innovations, and reporting from around the IT sector

Defense in Depth

Defense in Depth also known as the Castle Approach is an information assurance concept. It is defined as a concept in which multiple layers of security controls are placed throughout an information technology system. As compared to the Castle Approach one layer of security is simply not enough, the moat will not keep all the attackers away.

Seven Cyber Security Trends in 2016

Cyber Security is no longer a PC concern but has taken over mobile and cloud-based networks this year. Coupled with increased security risks and breaches at top firms and Fortune 500 companies, 2016 will be a year of change and revelations

1. Knowledge And Resources For Mobile Cyber Security

New trends such as Bring Your Own Device(BYOD) and businesses that use mobile only devices have left gaping holes for social engineers and cyber criminals to slither through.

Top Technology Trends for 2016

The world of technology changes rapidly, and it can be hard for ordinary consumers to keep up with the innovations. A decade ago the iPhone did not exist -- now many of us cannot imagine life without one. It was not long ago that attempts to build a tablet computer had been deemed a failure, but now we carry our iPads and Kindles with us wherever we go.

How to Protect Your Small Business Against Cyber Crime in 5 Steps

Most modern businesses rely on the Internet for ordering stock, making sales, managing orders and keeping in touch with customers. This means they are vulnerable to the increasing threat of cyber crime. Large criminal networks and hacking groups tend to focus on corporations and larger organizations, but small businesses are increasingly under attack by cyber criminals.

Hacks You Need to Be Aware Of

Although companies are spending more than ever on computer security  (Gartner, a leading IT security firm, estimates that over $71 billion was spent in 2014) you still need to be vigilant. And, with the advent of the so called "Internet of Things," you need to look after your data and hardware in places and ways you never even considered before.