Tag Archive: equipment security

Mar 18 2016

Ransomware 101: key things you need to know

Ransomware attacks have been on the rise, and are being experienced in the Caribbean. Here is a quick summary of the threat and actions that could be taken to minimise exposure. Over the past several months, network security experts have been highlighted, and have been concerned about, the marked increase in ransomware worldwide. Several organisations …

Continue reading »

Permanent link to this article: http://www.ict-pulse.com/2016/03/ransomware-101-key/

Jan 29 2016

3 key questions to ask about BYOD to the workplace

In light of the growing adoption of BYOD, here are three questions both employees and employees should ask. Globally, there is a growing trend towards adoption of bring your own devices (BYOD) arrangements in the workplace. Further, increasingly, employers are expecting their employees to use their devices, such as their mobile/cellular phones, smartphones, laptops and …

Continue reading »

Permanent link to this article: http://www.ict-pulse.com/2016/01/3-key-questions-byod-workplace/

Jun 05 2015

Disaster recovery as a service for business continuity

A brief look at Disaster Recovery as a Service, and three things to consider before buying it. With the 2014 hurricane season upon us, and predictions of up to 11 named storms in the Atlantic region this year, once again, we are reminded to have disaster preparedness top of mind. For organisations, the subject of …

Continue reading »

Permanent link to this article: http://www.ict-pulse.com/2015/06/disaster-recovery-service-business-continuity/

Sep 10 2014

Are government-issued laptops being compromised at the factory or after being assigned?

A discussion on a recent report on finding spyware on a government-issued laptop assigned to a student, against concerns that the devices might already be compromised before they end up in the students’ hands. In Trinidad and Tobago last week, the Chairman of the board of directors of the Trinidad and Tobago Amateur Radio League …

Continue reading »

Permanent link to this article: http://www.ict-pulse.com/2014/09/government-issued-laptops-compromised-factory-assigned/

Sep 05 2014

4 considerations when storing data in the cloud

The hacking of celebrity accounts in late August has reminded us how vulnerable private information stored online is. This article provides some guidelines on practices that should result in safer cloud use. Within the past week or so, various private accounts for a number of well-known celebrities were hacked and about 200 photos were posted …

Continue reading »

Permanent link to this article: http://www.ict-pulse.com/2014/09/4-considerations-storing-data-cloud/

Older posts «

» Newer posts