Snoonan

About Sarah Noonan

This author has not yet filled in any details.
So far Sarah Noonan has created 36 blog entries.

Datacentre Modernisation – It’s All About the Software

Faster. It’s a word for our time, characteristic of diverse aspects of business. Everything moves more quickly today than it did yesterday, driven by fierce competition to be first to market and a relentless stream of technological advances that enable the ever more rapid execution of virtually everything. In few arenas is this more [...]

2019-02-07T09:17:54+00:00 February 7th, 2019|Uncategorized|0 Comments

MTI Statement on the preparations for the United Kingdom to leave the European Union

Following the triggering of Article 50, the United Kingdom will leave the European Union on the 29th March 2019. At this stage it is impossible to know whether A) the exit will be delayed or reversed, B) a deal of some kind will be reached with the governments of the European Union, which will [...]

2019-01-29T17:09:35+00:00 January 25th, 2019|MTI Press Releases|0 Comments

Insider Threats – Three Things to Know

Insider threats are tricky. With most security solutions designed primarily to keep the bad guys out, addressing attacks which originate inside your organisation demands a new mindset and different technology. There’s no doubt that insider threats are an issue. In a study of over 5,000 organisations around the world, Kaspersky Lab and B2B International [...]

2019-01-25T13:43:06+00:00 January 25th, 2019|Security blogs|0 Comments

The Modern Approach To Datacentre Security

With the increase in the use of applications, connected and mobile devices, enterprises are constantly facing a surge in cyber threats. The attackers, meanwhile, are using more sophisticated methods to hack into systems, penetrate networks and steal data. Data breaches can cost firms thousands if not millions in fines – let alone the costs [...]

2019-01-24T15:38:30+00:00 January 24th, 2019|Security blogs|0 Comments

Cloud Usage – Are You Flying Blind?

The adoption of cloud services has been near-universal, and both swift and unrelenting in nature. It’s not hard to see why. Cloud makes powerful tools and resources easily available to all, on a wide variety of devices, wherever users can connect to the Internet. Ubiquitous, easy access to powerful technology, as and when it [...]

2019-01-18T15:49:15+00:00 January 18th, 2019|Uncategorized|0 Comments

NCSC Warns Of Rising Office 365 Account Compromises

What is happening? NCSC recently published an Advisory regarding several incidents involving compromise of Office 365 user accounts within the UK and using them in targeted supply chain attacks. To be clear, this is not a vulnerability in Office 365.  NCSC are highlighting that O365 users are being increasingly targeted by attackers given its [...]

2019-01-15T16:55:00+00:00 January 8th, 2019|Security blogs|0 Comments

The Enemy Within: Five Things To Know

  It’s tempting, when considering cybercriminals, to visualise shadowy figures hunched over dimly lit keyboards in some distant location. The reality is altogether more concerning. The greatest threats to your enterprise’s cybersecurity are probably much closer to home. The individual about to be responsible for a data breach costing your organisation millions, and inflicting [...]

2018-12-17T14:04:55+00:00 December 17th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Benign Third Parties

  About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose [...]

2018-12-07T11:11:15+00:00 December 7th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Developers

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-12-06T12:22:21+00:00 December 6th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Malicious Insiders

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-11-23T13:29:49+00:00 November 23rd, 2018|Security blogs|0 Comments