Facebook iconTwitter icon
Protecting Sensitive Data: Understanding GDPR Compliance
Thumb gdpr

Data protection has always been a concern within the modern workplace. This variable is soon to take centre stage with the introduction of the General Data Protection Regulation (GDPR) protocol. Set to be released in May, this act seeks to minimise the chances that potentially sensitive information stored on portable devices may become compromised. What are the main concerns and how can organisations comply with these new regulations?


The "BYOD" Risk

The concept of "bring your own device" has existed for some time and as a growing number of workers are now...

» Read more
The Need for Strong Security Measures In BYOD Programs
Thumb devices2

Many companies are implementing the concept of Bring Your Own Device (BYOD) as smartphone ownership increases heavily among consumers. BYOD refers to employees using personal devices for business-related activities by integrating them with a company’s software, hardware and networks. BYOD programs have been integral in boosting employee efficiency, cost savings and productivity. However, having employees access business information on their tablets or smartphone poses certain security threats. An nterprise can put in place various measures to curb these threats.



» Read more
Multi-cloud as a gateway to digital transformation
Thumb cloud6

As technology drives change in business at a very fast rate, the demands of end users keep on rising. Organizations are thus faced with challenges in adapting to these digital demands while operating in real time to safeguard their data at minimal operational costs. Cloud innovation is thus a critical digital transformation agent for enterprises that want to run better and grow faster. Setting up this model has its risks and crucial choices have to be adhered to lest all its benefits are wiped out. 


Developing the multi cloud architecture

Putting a robust IT infrastructure in...

» Read more
EU-Commission Draft Report Seeks to Protect Encrypted Communications
Thumb euparlament

The UK government calls clashes with the European Parliament draft to allow access to encrypted messaging platforms like WhatsApp and others. The EU draft report sites inconsistency in amending and keeping pace with the advancing technology of the 2002 regulation on ePrivacy. The focus by the European Parliament is to deal with over-the-top (OTT) services which imitate the conventional communication systems, such as landline telephones which had little privacy, although their regulation and protection is different. 


The UK government's Concern on Encrypted Communications


» Read more
Practical Advice
Germany sets standards for consumer-friendly apps
Thumb iphone

Consumers are increasingly worrying whether the friendly-looking app they’re inviting onto their phone may actually turn out to be less friendly in practice. The areas of concern are legion. Take data protection – if consumers have other apps on their phone, such as banking, they need to be sure that the app they just downloaded isn’t hostile. The concerns are even graver when the app has permission to track their location or scan their emails. Photos are now becoming an issue too, since facial recognition is beginning to be widely used.


User friendly...

» Read more
The big data acquisitiveness of mobile apps
Thumb open uri20150421 475075 9alpps

Working with mobile devices has some pain points for security reasons. Rules for data access and security systems to protect company data on devices used for work are important. But the security of personal data is as important.

On Facebook people check exactly what data they give away to the public. For additional tools, they check what data these tools want have access to, because they want protection for their personal data and contact details of friends.

But using a smartphone is like playing with the huge amount of different apps that could be downloaded in the shops. The danger through...

» Read more