Cyber Security (16)

Cipher

Public Key Infrastructure (PKI) Fundamentals

Public Key Infrastructure can be daunting for many administrators - knowing how to issue certificates is one thing but understanding what they actually contain is another thing entirely. Previously, data was encrypted with a key and to decrypt it, the same key was used again,…

Continue reading...
Cipher

Securing Company Data on Personal Phones

Protecting organisational data no longer stops on the devices handed out - most users sign in on their phones to check emails and files on the go. In some respects, this is a good thing. It saves the company money because they don’t need to…

Continue reading...
Cipher

VPN Prevention on an Enterprise Network

Virtual Private Networks have become ubiquitous in the last year or so as governments start implementing restrictions on social media and other online content. If rumours are to be believed, they will soon come for VPNs themselves! I’m not convinced every user understands that using…

Continue reading...