5 steps to build your cyber security strategy With every passing day, businesses become more reliant on online resources. It’s very likely your business has either moved to or at least discussed shifting workloads to the cloud. Simultaneously the cyber security challenges are becoming more and more complex. A single security breach of your company’s data can have a far…

The recent DDoS attack against DYN’s DNS services on October 21st was a rude wake-up call to many organisations.  The attack effectively crippled many large internet websites and social media services and caused large-scale disruption to thousands of small and mid-sized businesses across the eastern seaboard of the USA. In light of this, we’d like to…

Cloud Security Tips The nightmare of forever-lost, accidentally deleted files could potentially be over with the advent of cloud computing, but security breaches pose a new set of concerns for business professionals. On the professional side, failure to protect customer data is a public relations nightmare that could also open businesses up to litigation. A…

Centralizing and delegating control of your mission critical systems and data out of the office and into the cloud is something that would make any business cringe. We understand that and have learned this first hand when building cloud services. Security has been proven to be an area that has become a constant challenge for…

Todd Howe, Linux Systems Engineer Traditionally, specialists in information security divide into two opposing camps — the Red Team and the Blue Team. The Red Team’s role is to simulate barbarians at the gate: probing network defences and acting like attackers in order to expose and report weaknesses. Blue Team is left to pick up…

From policies and practices… Without exception, consumers at companies need to take a greater interest in the privacy policies governing how data is handled by their technology providers, this ties in with the previous remarks about informed trust. The questions aren’t limited to the technology measures a supplier uses to maintain confidence, but rather about…

Think in 3 P’s and criticality People, processes and parts are the 3 Ps that are often subject to scrutiny and hardening. Things that are heavily relied upon to handle data such as people, methods, software, hardware, and equipment pose potential business risks to DSPs and their customers. In some industries and in certain processes,…

Data privacy today We seem to be greeted with weekly news of new security breaches or revelations of intercepted traffic. The data and Managed Services market, with its multi-billion dollar growth, isn’t likely to be affected as much and will be able to open up opportunities for companies. These opportunities range from having different ways…

Copyright © 2017 Pathway Communications. All Rights Reserved. Pathway Legal