Tridents new Security Operations Centre
We are very pleased to announce the upcoming launch of our new Security Operations Centre (SOC). Headed by highly qualified and certified security professionals, the SOC is a centralized location from which all our security solutions can be deployed, monitored an [Click Here To Read More]
In a recent survey conducted across multiple industries in the United States it was found that over 50% of organisations had at least one serious vulnerability every single day of the year (White Hat Security, 2015)!
Web applications have enabled organisations to build stronger relationships with their customers, suppliers and stakeholders [Click Here To Read More]
The preferred method for attacking businesses' online assets is via their web applications. According to a study released last year by HP, 69% of web applications scanned by the company had at least one SQL injection error, and 42% contained a cross-site scripting vulnerability. A White Hat Security Report (https://info.whitehatsec.com/rs/675-Y [Click Here To Read More]
There’s nothing worse in the field of technology than having a criminal in control of your network. When a ransomware attack occurs, it can easily elevate from a potential data loss to potential identity theft to a data breach in the form of extortion. Many various types of ransomware such as Cryptolocker are on the rise across the web wi [Click Here To Read More]
While banks and financial institutions have a lot to lose financially, people tend to forget how much Personal Identifiable Information (PII) smaller organisations hold and just how valuable that is! Think of all the PII a school holds on its staff, students, parents, past students, creditors and the wider community! What do we have of Value? [Click Here To Read More]
For many years’ companies have been focussed on the security required to protect their IT investment and their data. Companies have installed firewalls and Anti-virus solutions and many would be quite confident that they have a good level of security in place. Unfortunately, today’s threat landscape has changed so rapidly and is no [Click Here To Read More]
Over the last week, the focus of IT professionals has been drawn towards Symantec, as details were released regarding more than two dozen vulnerabilities in its anti-virus software, many of which have been listed as "high" severity. The vulnerabilities cover most of the company's consumer and enterprise products, and some will need to be manual [Click Here To Read More]
For the past 10 years I’ve been having discussions with many schools about using IP based security cameras in a large number of varied environments. Throughout this time I’ve come across a number of things that school’s maybe haven’t considered, or have incorrectly believed about the technology.
To help, those of you [Click Here To Read More]
The effective management of passwords is the first line of defence in the electronic security of any organisation.
Benefits of a Password Procedure
Appropriate access for all staff;
Effective identity management and access auditing;
Preservation and protection of personal information entrusted to your care;
Protection of YOUR [Click Here To Read More]