ISN continues its commitment to professional development and maintains their ability to offer industry leading best of breed solutions by networking with industry leaders in the Microsoft world at MS Ignite.
Cyber Security: The Current State of Play Cyber criminals are becoming ever more sophisticated and resourceful – and are increasingly inclined to lock systems and destroy data as part of their attack process.
2017 is the year of ransomware, says a recent report by the Institute for Critical Infrastructure Technology, an industry think tank. When it comes to battling ransomware, your best offence is a good defence.
‘Shadow IT’ is a term often used to describe information technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term ‘Stealth IT’, to describe solutions owned, specified and deployed...
Adaptive authentication is an extensive fraud detection system in which risk-based multi-factor authentication is used to ensure the protection of users accessing websites, portals, browsers or applications.
When it comes to securing the enterprise, the rise of cloud, BYOD and mobile working have changed the rules of the game. Today’s IT teams have to cope with ever more complex networks – opening up vulnerabilities to a rapidly...
The biggest multi-agency training exercise in London Fire’s history – Exercise Unified Response is a large scale and complex, disaster training exercise...