These days, the occurrences of organisations being breached and customer’s credit or debit card data being accessed is a common story that we’ve all become familiar with. In fact, it’s probably safe to say that most of us have been affected by it at one time or another. This is caused by malware […]
Some of the biggest data security breaches in recent years were possible because of remarkably simple oversights. Data thieves for the most part, don’t resort to extremely sophisticated means and rooms full of highly experienced hackers using powerful computers. Rather, they rely on simple and obvious mistakes and sloppy (or nonexistent) compliance.
TagsCIO Cisco cloud computing cloud data centre cloud hosting cloud providers cloud security cloud services cloud strategy collaboration desktop virtualization dotcloud boom Freeform Dynamics Frost & Sullivan Gartner hybrid approach ICT strategy Internet Speed iPad Metro Ethernet Microsoft Microsoft Sharepoint MPLS Network monitoring outsourcing PCI DSS Polycom private cloud public cloud remote working ROI analysis SaaS server virtualization small business SMB SME Tablet PC telecommuting Unified Communications videoconferencing Vidyo virtual company virtualisation virtualization strategy Webex