By the end of 2018, over 50% affected by the GDPR will not be in full compliance with its requirements. Don’t delay. Comply with GDPR and APRA, ensure service uptime, and avoid penalty.
You may also like:
Is Your Printer HP Secure?
Kingston delivers performance, reliability and consistency to enterprise IT environments
Technology products that empower innovation, consistent and reliable performance for enterprise environments.
Sophos Public Cloud
A range of Sophos security solutions protect your infrastructure, whether running in the cloud, on-premises, or in a co-location facility.
Sophos Cloud Optix Datasheet
Sophos Cloud Optix agentless, SaaS-based service combines deep security expertise with the power of Artificial Intelligence.
Intercept X Deep Learning
Exploits Explained: Comprehensive Exploit Prevention
Top 5 Reasons You Need EDR
2019 SonicWall Cyber Threat Report: Unmasking Threats that Target Enterprises, Governments, and SMBs
The launch of the annual SonicWall Cyber Threat Report always reminds us why we’re in this business. Our engineers and threat researchers dedicate months to the project in order to... The post...
Cyber Security: Three Parts Art, One Part Science
As I reflect upon my almost 40 years as a cyber security professional, I think of the many instances where the basic tenets of cyber security—those we think have common... The post Cyber Security:...
Dive into Software: New Microsoft 365 Changes
Today, I have a roundup of changes/improvements that were announced to the Microsoft 365 product catalog in November 2018 and in January 2019. Most of these changes took effect on... The post Dive...
The Benefits of a Self-encrypting Drive
Build a Layered Security Solution
Modern cyber attacks are increasing and are becoming more sophisticated. In addition to existing malware, security experts are seeing an increase in never-seen-before malware. For the average...
Are Printers Your Security Weak Spot?
Does your organization have networked printers? If the answer is yes, they may be one of your organization’s most critical—and most overlooked—cyber security weak spots. The Ponemon Institute is...
7 Key Tools for Maximum Enterprise Security
HP Compute Security Solutions
Citrix NetScaler Security
Recently, I had an opportunity to learn and work with one of Citrix’s flagship products called NetScaler. In this two-part article, I am writing a broad overview on the NetScaler’s... The post...
Understanding the Internet of Things and Security Threats You Never Knew Existed
It’s the dawn of a new era for a set of networking protocols known as universal plug and play (UPnN) and Internet of Things plug and play. The Internet of... The post Understanding the Internet of...
Build Your Cloud Security Program with Microsoft Secure Score
The latest Microsoft Intelligence Security Report shared some interesting statistics that had me thinking for several days. The report shows how businesses lose $1M per minute to cybercrime around...
Cyber Security Is Everyone’s Business
Many organizations place the responsibility of cyber security on the shoulders of their IT departments, but effective security must be a company-wide endeavor. Every security policy in the world...
Samsung Solid State Drive