CIA failure has exposed the security vulnerability of IoT devices

March 29th, 2017 Posted by Security 0 thoughts on “CIA failure has exposed the security vulnerability of IoT devices”

The revelation by WikiLeaks that the CIA ‘lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation’ once again brings cyber security and defending yourself against attacks to the fore.

(more…)

Is there a security threat hiding behind your printer?

March 28th, 2017 Posted by Security 0 thoughts on “Is there a security threat hiding behind your printer?”

It seems common that the feedback we hear from those who have attempted the mammoth task of deploying NAC is ‘Nightmare’ or ‘given up’. Why should controlling your own network and connected assets be so difficult? There are a few reasons that immediately spring to mind, BYOD (or if we go large the Internet of Things) and the traditionally intrusive nature of the NAC beast and the inability of a number of network connected devices to use agents making them difficult to verify.

(more…)

Trust is a fundamental aspect of network security, but how can we guarantee it?

March 28th, 2017 Posted by Security 0 thoughts on “Trust is a fundamental aspect of network security, but how can we guarantee it?”

Good network security is about being able to say you trust the systems that access your network and the applications within it. This level of security, for any organization, is a serious undertaking and, like an insurance premium, a necessary item on the list of things that have to be assessed and prioritised.

(more…)

Follow us

   

Headquarters
21 London Road
Twyford
United Kingdon
RG10 9EH
+44 (0) 800 779 7322
Corporate
© Copyright Rebasoft 2017