2014 was the year of security breaches with companies one after another who were becoming victims to hackers and data breaches. The climate for 2015 looks to be the aftermath with everyone wondering what can be done to prevent such things in the future. In 2014, Hypersocket took these incidents and focused upon ensuring […]
What is the Danger of BYO Device Policies?
How to Protect your Network from Personal Devices The “consumerisation’ of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD). These policies have become prevalent in most corporate environments, and […]
The Virtues of Virtual Private Networks (VPNs)
The Virtues of Virtual Private Networks Cloud computing is here to stay, and the buzz throughout industry and government is that hybrid clouds will become the new norm going forward. Hybrid clouds, according to industry experts, can offer the security of on premise, private clouds and the flexibility and agility of commercial public clouds. The […]
Regulating IT: The Two Most Important IT Security Takeaways from Cyber Regulations
The biggest challenge facing most companies today is IT security. The seemingly endless increase in cyber-attacks and password breaches are only the tip of the iceberg. A tightening of all regulations and compliance requirements around IT Security, foreign conflicts that are now affecting the average consumer, and the increase in the number of networkable devices […]
The IT Security Maturity Model for Any Company
Planning and policies for IT security pay off, not only in savings in the event of a data breach, but also by reducing the likelihood of a breach. According to a 2014 Ponemon study sponsored by IBM, the average cost to a company for each compromised record with sensitive or personal information was $201. But […]