Global cybercrime threats in 2024, and what to look out for

May 10, 2024By Brett RoweCyber Security, Data security, IT security weak links, Network Access Control, Phishing, Ransomware, Technology

As technology continues to evolve, cybercrime is also growing at pace. Attackers are employing ever-more sophisticated tactics to target individuals, businesses and critical infrastructure. As of May 2024, it was reported that there were 35,900,145,035 known data breaches so far this year in 9,478 publicly disclosed incidents

How the rise of deepfakes is changing the cybersecurity landscape

April 23, 2024By Brett RoweCloud Computing, Cyber Security, Data security, Deep Fakes, Technology

Deepfakes have been around for almost a decade, but only started to gain traction in 2017. They are artificial media that use known, valid data and a form of Artificial Intelligence (AI deep learning) to manipulate videos, images or audio, making it difficult to distinguish between real and fabricated content. Deepfakes are categorised as social engineering attacks that can be used to breach an organisation’s network and compromise internal data.

Seven Use Cases where Low Latency is Key

February 22, 2024By Brett RoweAutomotive, Data security, Technology

With the ongoing demand for real-time business-critical applications like voice, video and the metaverse, the demand on network performance has intensified. Low latency is critical to all size of organisations because it directly influences the responsiveness and performance of systems, applications and networks. What is low, or network, latency? Network latency is a delay in … Read More

Choosing your cloud service – the inside track

February 22, 2024By Brett RoweCloud Computing, Cyber Security, Data security, LaaS, PaaS, SaaS, Technology

Managed application hosting is beneficial for organisations that want to offload the operational aspects of hosting, allowing them to concentrate on developing and improving their applications. It can reduce the burden of infrastructure management, enhance scalability and provide a more reliable and secure environment for running applications.