Blog

News and Advice For Your Business IT Needs

The Importance of Updates

August 17, 2012
Chris Fairey
No Comments
The recent news that the Reuters News Agency's blog has been compromised for the third time in a month has got me wondering exactly what process the administrators went through after the first attack.

Protect Your Source Code: Part 1

August 15, 2012
Chris Fairey
No Comments
I recently spent the weekend in Brighton, at the first PC and Indie Games Conference, Rezzed. During the weekend, I went to various developer sessions where games developers talked about the processes they used to develop their games, the next titles they were working on, or how their latest game was born.

Setting Up Google 2-step Verification

August 9, 2012
Chris Fairey
No Comments
The recent article in Wired Magazine (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/) relating to a sophisticated attack against a specific individual that led to the closure of their GMail Account, compromise of their Twitter account, Amazon Account and Apple iCloud Service (which the attacker then used to wipe the data from the victim's iPhone, iPad and Mac), highlights the need […]

Why Strong Authentication Systems Matter

June 20, 2012
Chris Fairey
No Comments
The recent attack on, and compromise of LinkedIn and their password data has highlighted the need for strong authentication practices, and a lack of awareness among certain developers of security best-practice.
With its ever-increasing number of users, the Internet has become the primary communication mechanism for many individuals around the world. Governments who wish to maintain the ability to protect their citizens from harm need to develop evermore sophisticated methods of capturing and analysing data flowing through the ever-increasing numbers of social networks, online chat and […]
1 4 5 6 7 8
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram