BYOD: Bring Your Own Device-Placing limits

BYOD: Bring Your Own Device-Placing limits

Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...
Multi-factor Authentication Demystified

Multi-factor Authentication Demystified

You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. What is Multi-factor Authentication? As fancy as the term sounds, multi-factor authentication (MFA)...
Dark web monitoring: What you need to know

Dark web monitoring: What you need to know

The dark web is essentially a marketplace for cybercriminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold to miscreants who can later hack into your system. As a result, they can extort money from you to prevent a...
BYOD can have some downsides

BYOD can have some downsides

Employers know that employees prefer BYOD (bring your own device) policies and that they can increase productivity. However, BYOD can have some downsides. The most prominent concern among those who have to address the BYOD issue is an increase in data security risk....
The dark web: An introduction

The dark web: An introduction

Have you come across the term, dark web, recently? You might have heard that you need to keep your business data safe from this part of the web. So, what is the dark web anyway? WHAT IS THE DARK WEB? The cybercrime landscape is evolving fast. The “Nigerian” email...