<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

Mastering GDPR Data Compliance for Microsoft Office 365

5 Feb., 2018

As a business providing IT consulting services to local government, IT-Additional-Services has very high standards when it comes to protecting...

Read More

The Advantages and Disadvantages of Cloud Computing

2 Feb., 2018

2017 was a banner year for data breaches. Look back at the year’s biggest hacks and learn how enterprises can avoid the same mistakes while cloud...

Read More

Biometrics leading the security charge for Millennials

1 Feb., 2018

The public has spoken and the demand for security has never been greater according to latest IBM Security Study.

Read More

Data breach at healthcare provider threatens half the population of Norway

26 Jan., 2018

From HRMC warning taxpayers over scammers to a data breach of Norway’s most popular healthcare provider and the dark web selling babies’ social...

Read More

Is Your Organization Ready for GDPR?

25 Jan., 2018

New study finds UK businesses are the most in shape and equipped when it comes to GDPR compliance.

Read More

Why Utilizing Encryption Technology Could Save Your Company From Serious Breaches

23 Jan., 2018

The threat of data theft from large corporations by malicious attackers is an everyday reality now. Here’s why encryption technology could save...

Read More

With Increased Cloud Adoption Comes Even More Risk For The Data

19 Jan., 2018

Who oversees security in the cloud? The cloud provider? The cloud user? Or is it both? Either way, there seems to be an air of uncertainty when it...

Read More

Survey reveals CISOs lack confidence when it comes to keeping up with cyber attackers

18 Jan., 2018

CISOs are feeling less confident than ever about cybersecurity.

Read More

How to Determine if you Need a Cloud Access Security Broker

17 Jan., 2018

With the cloud becoming a prevalent force in many enterprise companies, Cloud Access Security Brokers are becoming a big deal. Here's how to find...

Read More

Why Data Sovereignty is Transforming Cloud Services Adoption and How it Will Affect Your Business

16 Jan., 2018

Like people, digital data can’t just travel wherever it wants. Learn how data sovereignty is changing the adoption of the cloud and how it’s...

Read More

Social Networking site provides encrypted open-sourced security for group chat

15 Jan., 2018

The online social media and social networking behemoth known as Facebook has incorporated encryption technology within one of its new tools.

Read More

5 Things You Didn’t Know About Modern Cloud Data Encryption

12 Jan., 2018

More and more enterprise companies are adopting the cloud to store and transfer valuable data. Here are five things you may not know about modern...

Read More

Mobile retailer under fire for data breach

11 Jan., 2018

Just a few days into 2018 and already the UK’s Information Commissioner’s Office (ICO) is back to work issuing fines for companies who have been...

Read More

Data Protection by Pseudonymization

10 Jan., 2018

Pseudonymization and anonymization are two options available to companies aiming to implement an important principle of the European General Data...

Read More

Lapse in encryption security blamed for data breach at American Retailer

8 Jan., 2018

We are less than a week into the New Year and there is already news related to data breaches, malware and encryption.

Read More
2 3 4 5 6
Seite 4 von 9