Bwong

About Bryan Wong

This author has not yet filled in any details.
So far Bryan Wong has created 14 blog entries.

Ensure Employees Are The First Line Of Defence In Your Cyber Resilience Plan

It’s often said that people are your organisation’s weakest link, and that’s true up to a point. But with the right employee training, they could also be a great first line of defence. When combined with the right security tools, techniques and processes, you could do enough to deter all but the most determined [...]

2018-12-10T14:22:04+00:00 December 10th, 2018|Blog, Security blogs|0 Comments

How Hackers Can Take Down Critical Energy Systems Through The Internet?

Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected systems, especially through the integration of industrial internet of things (IIoT) technologies. This continuing [...]

2018-11-15T11:24:50+00:00 November 15th, 2018|Blog, Security blogs|0 Comments

600,000 breached company email credentials available on dark web

Latest News Recently it has been discovered that over 600,000 breached company email credentials from the UK’s leading construction, architecture and property firms are readily available on the dark web. Of the email credentials available, more than 450,000 of the breached credentials were from the UK’s leading construction firms. 110,000 were linked to top [...]

2018-11-01T15:25:31+00:00 November 1st, 2018|Blog, Security blogs|0 Comments

Threat Spotlight: Account Takeover Incidents Widespread for Phishing campaign

Account takeover incidents, where attackers steal the credentials of employees and use them to send emails from the user's real account, are increasing in frequency and magnitude.  In this Threat Spotlight, we take a closer look at the motives and demographics behind these attacks. Highlighted Threat:  Account Takeover – attackers attempt to steal [...]

2018-10-31T14:41:02+00:00 October 31st, 2018|Blog, Security blogs|0 Comments

How to execute a cloud first strategy for file storage?

How do I get my files from on-premises to the cloud?  Should I go hybrid or full cloud?  Which one is right for my company? What are the steps? Many companies are far down the road of putting applications and compute resources in the cloud, but haven’t yet considered the impact a cloud-first strategy [...]

2018-12-12T09:56:10+00:00 October 12th, 2018|Blog|0 Comments

The 6 Things To Consider Before You Refresh Your Infrastructure

6 vSAN Success Factors When planning a new vSAN infrastructure or upgrading or extending an existing environment, many organisations favour vSAN, VMware’s software-defined storage (SDS) solution for hyper-converged infrastructures. It is not unusual to assume that vSAN’s capabilities render hardware a matter of secondary importance. This is a serious mistake: the performance, scalability and [...]

2018-10-12T13:39:08+00:00 October 11th, 2018|Blog|0 Comments

How to Address Email Gaps in Office 365

The Email Features in Office 365 May Not Be All You Need... Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwide are now on Office 365. While the move to the cloud represents potential savings for [...]

2018-10-08T09:07:47+00:00 October 5th, 2018|Security blogs|0 Comments

IT Security Vulnerability – Routers, Switches & Firewalls – Latest Blog Post

As part of our extensive penetration testing experience, MTI has identified the eight most common attack vectors found through regular testing. Every organisation today has an IT infrastructure of some kind that supports the operations of a company and processes its data, from basic internet-facing services, such as email and websites to segregated internal [...]

2018-10-05T09:19:38+00:00 October 3rd, 2018|Blog, Security blogs|0 Comments

Office 365 and Email Security – Mimecast

Is Moving To The Cloud The Right Time To Rethink Your Email Security Strategy? In Partnership With Mimecast Microsoft Office 365™ is fast becoming the standard platform for organizations across the globe, with 135 million business users worldwide as Microsoft’s April 2018 earnings announcement. With a move to Office [...]

2018-09-07T12:44:16+00:00 September 7th, 2018|Blog|0 Comments

MTI Nominated for Security VAR of the Year

31 Aug 2018 CRN have just announced that MTI has been shortlisted for the prestigious CRN Security VAR of the Year Award. The judges confirmed a record number of entries for this year’s awards, but MTI is one of only three shortlisted for the Security VAR of the Year category. [...]

2018-11-16T14:03:17+00:00 September 3rd, 2018|MTI Press Releases|0 Comments