ITB - IT Solutions for the next generation
linkedin logo twitter logo facebook logo google+ logo
 

8MAN Gold Partner Status

Friday, January 19, 2018
8MAN Gold Partner Status ITB are pleased to announce we have recently been awarded gold status with our Partner 8MAN. 8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process ..
CONTINUE READING

Back to Cybersecurity Basics - Part 5: Managing User Privileges

Tuesday, January 16, 2018
Back to Cybersecurity Basics - Part 5: Managing User Privileges IT and Cyber Security means many different things to many different people. One size definitely doesn’t fit all, and different companies have their own individual challenges to resolve. The larger a company gets the more complex it’s security requirements become. Despite some anomalies, one challenge that grows with a company is the challenge of managing user privileges and access to privi ..
CONTINUE READING

Back to Cybersecurity Basics - Part 4: Information Risk Management

Tuesday, January 09, 2018
Back to Cybersecurity Basics - Part 4: Information Risk Management With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whether him going outside would impact his health. During this risk assessment, I had to decide h ..
CONTINUE READING

Back to Cybersecurity Basics - Part 3: Incident Response

Tuesday, January 02, 2018
Back to Cybersecurity Basics - Part 3: Incident Response ‘It’s no longer a case of if but when’. Of course, those of us who have been working in the IT Security industry for longer than we care to remember know that we’re talking about becoming the victim of a cyber-attack. For many of the larger organisations around the world this is nothing new, and I’m sure they’re under attack as I write this blog. As an industry, there has been a shift ..
CONTINUE READING
1 2 3 4 5 .. 20 Next