Cloud Computing And Online Security

Cloud computing is everywhere, used on a day-to-day basis by consumers as well as large companies and this will only continue. With so many people using the cloud, the issue of security has never been more important, but by following some simple tips, you can enjoy all the benefits without risking your data. One of […]

Why IT Security Investment Is Now Integral To Business Success

In 2013 we are more and more dependent on technology in our every day business lives than we have ever been before, whether it’s using social media accounts for profile raising or introducing software such as document management systems to organise information and precedents. This opens up a whole new frontier when it comes to […]

A Look at the Different Types of Malware

We all understand that ‘malware’ isn’t a positive thing – it generally indicates a type of programme that will do damage to your computer system for someone else’s profit. But outside of the fact that malware = bad, what do we really know about it? There are lots of different types of malware and we’ve […]

ITC Security Threat of the Week – Week 6: Buffer overflows

Risks Buffer overflows present a big part of IT security threats and they often result in a target host to be compromised, almost every Cisco device or any other vendor of your choice. An attacker would normally be able to execute their own code with the privileges of the vulnerable software and even escalate them. […]

The Risks of Using Public Wi-Fi

The Wi-Fi revolution has given us all freedom of movement, allowing everyone with a laptop or a smartphone to jump on a public network and instantly access any type of web page, from banking, through to shopping sites. Many of us never really consider that there could be any risks involved in using public Wi-Fi […]

ITC Security Threat of the Week – Passwords – Complex or simple

ITC Security Threat of the Week – Week 5: Passwords – Complex or Simple Risks Over the shoulder attack: when a person types in his or her password, someone might be able to observe what is typed and hence steal the password by looking over the person‟s shoulder, or by indirect monitoring using a camera. […]