SIEM (Security Incident and Event Monitoring), and why you need it

March 23, 2024By Brett RoweCyber Security, Technology

What is SIEM? SIEM – Security Incident and Event Monitoring – is a security solution that helps organisations recognise and address potential security threats and vulnerabilities before they have a chance to disrupt business operations. The technology centralises security information from multiple endpoints, servers and applications to help monitor IT infrastructure, check for anomalies in … Read More

Cybersecurity in education – the latest trends

March 23, 2024By Brett RoweCyber Security, Technology

Many education institutions are now using digital tools to put educational materials online, track student progress, share research and manage operations. However, by hosting a wealth of data online, it makes them increasingly vulnerable to cyberattacks. Education is among the sectors that experience the most cyberattacks, including healthcare, finance and retail. According to Check Point’s … Read More

Seven Use Cases where Low Latency is Key

February 22, 2024By Brett RoweAutomotive, Data security, Technology

With the ongoing demand for real-time business-critical applications like voice, video and the metaverse, the demand on network performance has intensified. Low latency is critical to all size of organisations because it directly influences the responsiveness and performance of systems, applications and networks. What is low, or network, latency? Network latency is a delay in … Read More

How Machine Learning can Enhance your Cybersecurity

November 30, 2023By Brett RoweTechnology

Cyberattacks are becoming increasingly refined, meaning that conventional cybersecurity measures struggle to keep up. However, the emergence of artificial intelligence (AI) and machine learning (ML) has opened up new opportunities for developing and implementing AI-based cybersecurity technologies and systems that can help combat cybercrime.

What is Website Clone (or Phishing) and 6 Ways to Protect Your Business Website

February 6, 2023By Brett RoweCloud Access Security Broker CASB, Cyber Security, Technology

According to research by The Anti Phishing Working Group, attempts at scams using Phishing and Social Engineering have tripled since 2019. It is no wonder that Phishing scams are one of the most common methods of attack today and also one of the most profitable for threat actors. Thousands of users, companies and employees are … Read More

SD-WAN

May 18, 2018By Andrew RadfordSD-WAN

SD-WAN Overview More and more customers are coming to us asking about SD-WAN and seeking our help to both understand it better, and assess if their environment is ready for it. What SD-WAN enables you to do is, in detail, specify policies for paths and priority for certain traffic types, applications etc, and easily roll … Read More