Category: Security

ZONE SE7EN > Blog > Security

post cover

Cloud Computing; Great, But What About Security?

As we become more accustomed to huge amounts of data that we have to deal with, and the world in which we live in is ever-more digital, organisations worldwide face the challenges of storing and analysing – the cost of storage, albeit cheaper than in recent years; processing the data; analysing and extracting the relevant […]

post cover

Is your Security Policy Adapting to Mobile Working?

The working environment is changing; mobility is becoming more commonplace in the business world with eMarketer predicting that there will be more than 1.91 billion smartphone users worldwide in 2015.  With this figure set ot rise by approximately 12.6% next year, these staggering statistics equate to every two in three people in the UK owning […]

post cover

Security Concerns Holding Back the UK from Voting Online

We bank online; we pay our taxes online; we pay bills online; we shop online; why can’t we vote online?  As we get ready to head off to our designated polling stations throughout the country to post our vote for the General Election on 7th May, this perplexing question is still vexing many.  Voting electronically […]

post cover

Could Legislation and Regulation Slow Down Technology Adoption?

By Tobias Manolo As the economy improves and businesses are finally feeling confident enough to start thinking of the future, about innovation, growth, expansion and investment, governments and regulators issue yet more legislation that organisations have to adhere to, all of which takes up those valuable resources which would have been put towards improving the […]

post cover

Hackers… Some Believe they do a Worthwhile Job, Says Survey

By Tobias Manolo Hector Xavier Monsegur, the hacker responsible for the 2011 cyber attacks against Sony Pictures Entertainment, the Public Broadcasting Service and Fox Broadcasting Company, has been spared a lengthy jail sentence, thanks to his help in preventing over 300 further cyber attacks since. Spotify, the popular Swedish music streaming service, has admitted it […]

post cover

Secure, Encrypt, Authenticate & Protect Your Data

ZONE SE7EN has launched their latest virtual event in their Insight Zone 2014 series, focusing on the data security industry.  ZONE SE7EN brought together experts and key industry thought-leaders and subjected them to a series of probing questions, providing you with informative, enlightening answers to help with those all-important security decisions. Insight Zone’s virtual Executive […]

post cover

Geo-Fencing’s Benefits Revolutionising Mobile Security

By Tobias Manolo Geo-fencing does exactly what it says it does – it builds a virtual ‘fence’ that will trigger different actions depending on whether the platform, user, service or application is inside or outside the fence – and it’s for this reason that more and more applications, network platforms and services use this technology […]

post cover

Storing Data on AWS? SafeNet Shows You how to Encrypt Sensitive Data

By Tobias Manolo More and more businesses are turning to pay-as-you-go cloud services to store corporate data and drive their business-critical applications; many are turning to Amazon’s Web Services, or AWS, but that doesn’t stop businesses concerns over protecting sensitive data or complying with regulatory requirements.  To address these issues, SafeNet have published an ebook […]

post cover

Improve Your Mobile Security with these Top Rated Apps

By Tobias Manolo With the increase in the use of mobile devices – smartphones, tablets, etc. – and the rise of in BYOD, be it Android or iOS, there are some top rated apps that can help you address security issues, such as encryption and managing passwords. Protecting sensitive and corporate data that is open […]

post cover

As Popularity of SMS-Based 2FA Rises, so do the Costs!

By Tobias Manolo If you’re not aware, SMS-based 2FA (two-factor authentication) is used by Facebook, Google and Twitter as a way of securing their data and services.  In fact, this method of authentication is fast becoming ‘the’ method to use when maintaining high value, sensitive and private transactions.  Internet businesses, enterprises and app developers now […]

Subscribe to our mailing list

* indicates required Email Address * First Name * Last Name *