Security 25th Jul 2019 City Power Hit by Ransomware City power confirmed in a tweet on July 25th 2019 that the power utility had… Turrito Networks 0 Love1
Security 19th Jun 2019 Q & A: Brian Timperley on Shadow IT What are the biggest Shadow IT challenges? Please outline at least three and explain why… Turrito Networks 0 Love0
Security 20th Feb 2019 Companies being proactive regarding threat detection and cybersecurity In today's cybersecurity landscape being proactive rather than reactive is crucial when it comes to… Turrito Networks 0 Love1
Security 17th Jan 2019 How can SMEs harness ‘Shadow IT’? For many of us, the term 'Shadow IT' instantly evokes images of nasty ghouls lurking… Turrito Networks 0 Love0
Security 17th Jan 2019 SA businesses ignoring critical cyber security challenges South African businesses are ignoring critical cyber security challenges. In 2019, US news agency Bloomberg… Turrito Networks 0 Love0
Security 12th Nov 2018 Lighting up the shadows – a look into Shadow IT Shadow IT. It has long been the dark and threatening risk to organisational security, lurking… Turrito Networks 0 Love0
Security 3rd Oct 2018 Meet the 4 companies using Blockchain in cyber security According to a 2017 study of global executives, 33% of organisations are considering or are… Turrito Networks 0 Love0
Security 25th Jul 2018 Why Social Engineering has become a greater threat to business today Within the context of information security, social engineering refers to insidious persuasion or manipulation of… Turrito Networks 0 Love1
Security 6th Jul 2018 The Need For Anti-Virus and Anti-Spam The need for anti-virus and anti-spam becomes apparent as we realise that the reality is… Right Click Media 0 Love0
Security 13th Feb 2018 The Security Threat with IoT With the IoT market increasing in size and more things become connected to the Internet,… Turrito Networks 0 Love0