Every day, data is being attacked from various sources. Distributed Denial of Service (DDoS) or Denial of Service (DoS) is a type of attack that renders a website resource unavailable to its users. These disruptions can come from multiple sources including zombie machines and botnets, which are infected with malicious software and give the attacker the ability to control the hijack remotely. These attacks are utilized by Cyber criminals for financial gain or deliberate disturbance to a company.Read More
When it comes to data protection, use and sharing, there are lots of legislations that are in place and some of them include: The Data Protection Act, Sarbanes-Oxley Act, the HIPPA, as well as other legislation. However, it is surprising to know that little or nothing is said about the fate of Digital Assets when a business is closed or purchased/merged with another. In these situations, it is important to use your common sense and make sure your actions do not compromise the safety and security of any sensitive data your company may have.
Therefore, what is the best place to start?Read More