Would you take offense if someone called you gullible, naïve, easy to fool? Of course you would! But have you never been duped, not even by fake jeans, fake...
Whichever way you look at it, the notion of cloud computing appears to be the logical, if not miracle, solution for end users who want to access their files...
Please, sir, I want some more… No, that was a different Oliver, wasn’t it? Even so, like young Master Twist, hackers have come back for a second pass at the buffet...
Here’s a riddle for you: lie back, relax, close your eyes, and think about the last time you did a SWOT analysis. Let’s forget about the opportunities and threats...
Research conducted by the Irish Computer Society has revealed that Irish firms are increasingly becoming the victims of external hacking incidents: more than half...
Once upon a time, in a land far, far, away, an evil villain found a document containing three magic words that would grant him riches beyond his wildest dreams. He...
Things must be looking up in the online security education arena: according to a Redcentric survey, over 40% of Brits think their passwords are so secure that...
2014 was a big year for hackers and their victims, resulting in billion-dollar losses for bosses and long faces all round for IT personnel. What’s worse, however,...
Big hacks in recent months – like Sony’s - have attracted global attention, compelling even heads of state like President Obama and PM David Cameron to make public...
It’s an understatement to say that the bring-your-own-device (BYOD) culture is gaining traction: already, 95% of firms allow it to some degree, and it’s a must-have...