Articles
Continuous scanning is essential to secure Web applications, says Hedley Hurwitz, MD of Magix Security.
The simple fact of being open to the public means these access points are not secure and are easy prey for criminals, says Hedley Hurwitz, MD of Magix Security.
The only risk mitigation strategies that work are those that identify suspicious events and raise the alarm before any damage is done, says Hedley Hurwitz, MD of Magix Security.
Proactive anti-money-laundering efforts save face, cut costs and minimise losses, says Hedley Hurwitz, MD of Magix Security.
The use of corporate laptops in the home environment, where security is secondary to convenience and fun, opens the network up to threats, says Hedley Hurwitz, MD of Magix Security.
Proper identity authentication is simple to achieve through biometric technology, which is fast, reliable and almost impossible to crack, says Hedley Hurwitz, MD of Magix Security.
File servers contain documents that are usually forgotten and left idle for years, available to any curious snoopers, says Hedley Hurwitz, MD of Magix Security.
Securing data effectively requires a multifaceted approach incorporating tools, knowledge and constant user activity monitoring, says Hedley Hurwitz, MD of Magix Integration.
Businesses that fail to monitor their ICT infrastructure as part of a risk assessment on a regular basis are likely to find their systems compromised, says Hedley Hurwitz, MD of Magix Security.
Monitoring employees is not an invasion of privacy, but a simple business process that observes how they do the jobs they are paid for, says Hedley Hurwitz, MD of Magix Security.
IT leaders should select application development platforms that incorporate automatic interface solutions, says Hedley Hurwitz, MD of Magix Integration.
A USB memory stick and a virtualisation solution can provide remote access from any machine, says Hedley Hurwitz, MD of Magix Integration.