Cloud Computing Origins

“I don’t need a hard disk in my computer if I can get to the server faster…carrying around these non-connected computers is byzantine by comparison.” Steve Jobs

The Digital Age

“Imagine a school with children who can read or write, but with teachers who cannot, and you have a metaphor of the Information Age in which we live.” Peter Cochrane

What security vulnerabilities lie behind your website code

There are over 2 billion websites on the internet today, 10 times the number compared to a decade earlier. Given that your website itself is built with computer text processing software, the written code of your website designers or that of the automated website builder tools will have vulnerabilities. This third part of our info-series lays bare the breadth of risks.

How to prevent illegitimate use of your company email addresses

Now that we have learnt about the fundamentals of a web address, Part 2 of our info-series explores the various checks & processes that authenticate your mail server. Whether or not your administrators have configured these rules of action will determine, for example, if the emails you send end up in the recipients’ junk folders.

What is a URL? Your website address explained

We begin our five-part series about website and email security by taking a behind the scenes look from the point when we type words into a browser to ending up landing on a website page.

Why a website security check is important for your business

By showing you the constituent parts of your daily communication tool – your email – as well as your shop window into which your customers and suppliers will be gazing – your website – you will begin to learn about the paths through which cybercriminals ultimately gain access to your data & systems.