Bwong

About Bryan Wong

This author has not yet filled in any details.
So far Bryan Wong has created 21 blog entries.

Cyber Security in Higher Education and Further Education: It’s all About the People

According to a recent survey by JISC, the top three cyber security challenges for universities, colleges and other academic institutions are phishing and other social engineering attacks, malware (including ransomware) and simple human error. The common weak points across all three are difficult to identify and diagnose, we look at how to address the human factor [...]

2019-03-26T13:38:31+00:00 March 12th, 2019|Blog, Security blogs|0 Comments

Dell EMC VxRail Simplifies networking, management and access to latest VMware innovations

News Summary: Dell EMC VxRail enhanced as an integrated cloud platform with support for VMware Cloud Foundation and fully automated network configuration with Dell EMC Networking SmartFabric Services Dell EMC VxBlock 1000 joins the Dell EMC Cloud Marketplace with new automation software and integration with VMware vRealise Suite, revolutionising converged infrastructure (CI) operations by [...]

2019-03-28T11:36:49+00:00 February 20th, 2019|Uncategorized|0 Comments

MTI Technology Achieve Microsoft Gold Partner Status

MTI Technology, a global provider of IT security services and solutions is delighted to announce that it has attained Microsoft’s Gold Partner status. In a significant step for MTI, the expertise recognised in Azure platforms allows MTI to give its customers more opportunity to modernise their infrastructure in the cloud. The significant milestone in the [...]

2019-02-01T11:03:42+00:00 February 1st, 2019|MTI Press Releases|0 Comments

Cloud Access Management – The Human Factor

Cloud adoption is now near universal: 93% of organisations use cloud services. The benefits, including ease of access, pay-as-you-go pricing and quick time to value, are well known. There are also challenges, though. As organisations expand cloud utilisation, there is often an inexorable spiralling of management and usage complexity, directly related to the human [...]

2019-03-28T16:14:33+00:00 January 28th, 2019|Gemalto, Security blogs|0 Comments

MTI Security Alert Subscription: 770 million Passwords Made Available

The largest dump of compromised email addresses and passwords ever made publicly available was discovered a few days ago on a popular web site used for illegal file sharing. Just over 770 million passwords are in the dump and are thought to be the combination of data obtained from a plethora of compromises spanning from [...]

2019-01-24T14:49:21+00:00 January 24th, 2019|Security Alert Subscriptions, Uncategorized|0 Comments

Cloud Essentials – Visibility & Control

Security is a key challenge for any organisation employing cloud services and applications, and one that cannot be met by traditional security tools and strategies designed for on-premise environments and technology. The right tools to provide visibility into cloud activities and resources, and security protecting users, assets and the business against diverse threats on [...]

2019-04-10T14:17:17+00:00 January 18th, 2019|Forcepoint, Security blogs|0 Comments

The Human Factor In Cyber Security – Malicious Third Parties

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose [...]

2019-04-10T14:17:56+00:00 January 8th, 2019|Blog, Gemalto, Security blogs, Trend|0 Comments

Ensure Employees Are The First Line Of Defence In Your Cyber Resilience Plan

It’s often said that people are your organisation’s weakest link, and that’s true up to a point. But with the right employee training, they could also be a great first line of defence. When combined with the right security tools, techniques and processes, you could do enough to deter all but the most determined [...]

2019-04-10T14:18:08+00:00 December 10th, 2018|Blog, Security blogs, Trend|0 Comments

How Hackers Can Take Down Critical Energy Systems Through The Internet?

Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected systems, especially through the integration of industrial internet of things (IIoT) technologies. This continuing [...]

2018-11-15T11:24:50+00:00 November 15th, 2018|Blog, Security blogs|0 Comments

600,000 breached company email credentials available on dark web

Latest News Recently it has been discovered that over 600,000 breached company email credentials from the UK’s leading construction, architecture and property firms are readily available on the dark web. Of the email credentials available, more than 450,000 of the breached credentials were from the UK’s leading construction firms. 110,000 were linked to top [...]

2018-11-01T15:25:31+00:00 November 1st, 2018|Blog, Security blogs|0 Comments