Multi layered approach to security

What if antivirus software fails to detect the problem? Earlier this year, Internet security firm Symantec confessed that its antivirus products detect malicious code less than half of the time. So does this mean that Norton and the other good guys are actually losing the battle against those who would wreak havoc on our systems?…

Cisco domain name DNS expiry

Who will own your problem when the big boys get it wrong? Business owners don’t just want their IT support company to intervene when there is a problem. They need someone to help manage their networks, plan budgets, contribute to IT strategies and then take ownership of the problem if things go wrong. A recent…

Do you know your worms from your bots?

With the never-ending stream of IT security advice on offer these days, users may become confused by the technical explanations they hear. From bots to botnets and Trojans to worms, the range of terminology can be rather daunting, which is why Prosyn has produced the following beginner’s guide to IT security vocab. Trojans Trojans is…

Flexible working and disaster recovery

New products and services from Microsoft, such as Office 365, OneDrive and Server Essentials, will continue to drive this growth. Many other vendors are following suit with the likes of Sage and Adobe offering cloud-based versions of their application software. Companies seem to be growing more comfortable with the security aspects of cloud computing. They…

What is two-factor authentication?

Security remains the number one priority for IT users and high profile breaches, such as those encountered by Facebook and Apple, continue to dent user confidence. Increasingly, there is a feeling that the traditional user name and password may have had its day. We now have so many of these logins, they are getting harder…