ITB - IT Solutions for the next generation
linkedin logo twitter logo facebook logo google+ logo

Back to Cybersecurity Basics - Part 7: Security Monitoring

Monday, February 12, 2018
Back to Cybersecurity Basics - Part 7: Security Monitoring Cyber attacks come in all shapes and sizes. From internal threat actors to state-sponsored attacks on government, security is now seen as one of the biggest threats to business. In fact, in the recently released World Economic Global Risks Report, cyber attacks were in the top 5 risks to global stability alongside natural disasters, extreme weather, data fraud and failure to address climate ch ..

Back to Cybersecurity Basics - Part 6: Removable Media Controls

Thursday, January 25, 2018
Back to Cybersecurity Basics - Part 6: Removable Media Controls One of the most difficult things to manage from an IT Security perspective is the actions of your users. Even the most trustworthy employees can fall prey to a phishing scam or leave their laptop on a train and then we have those employees who aren’t so trustworthy who may try to maliciously sabotage or steal sensitive information. One action that IT must be able to control is the use of R ..

Happy Birthday to Us!!!

Tuesday, January 23, 2018
Happy Birthday to Us!!! Time to break out the party poppers, ITB has turned 10 years old today! When looking back over the past 10 years, it’s amazing to think how much has changed in the world of IT Security. It makes us immensely proud to think that we have grown and evolved through all of these changes and will continue to do so. This we feel highlights our strong foundations and ability to react to chan ..

8MAN Gold Partner Status

Friday, January 19, 2018
8MAN Gold Partner Status ITB are pleased to announce we have recently been awarded gold status with our Partner 8MAN. 8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process ..
1 2 3 4 5 .. 20 Next