<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Everything the IT Security Channel Needs to Know About Machine Learning

What is IoT and What Security Concerns Does it Bring to the Workplace?

3 Things you probably didn't know about Multi-Factor Authentication (MFA)

Women in IT: 7 ways to close the gender gap

3 Worst Data Breaches From 2018 & How to Avoid Them

What is the difference between Artificial Intelligence, Machine Learning and Deep Learning?

Mighty Amazon Cut Down in Black Friday Data Breach

4 Reasons why the Future is Cloud

The Truth About Cloud Hosted Services and the GDPR

How to Choose the Right MSSP Provider (Top 5 Criteria)

4 Areas where the GDPR, NIS, Cyber Essentials & Minimum Cybersecurity Standard Overlap

5 Cloud Solutions That You Didn’t Know Existed

Cloud Hosted Software is more secure than your Data Centre (4 Reasons Why)

Data Security Solutions for Small Businesses

Everything you need to know about the clash of the Cloud providers

Does GDPR Require Double Opt-in Consent?

Keeping the healthcare industry safe with the right IT software

Finding Opportunities in the UK's New Minimum Cyber Security Standard

How to Ensure Safety from Fraud Within your Business

Everything you need to know about the NIS Directive

The Facebook fiasco – Social media, privacy, and what it all means to business

5 Tips on How to Write a GDPR Ready Privacy Policy

GDPR & Personal Data in the Public Domain

Preventing and recovering from a ransomware attack

Exercising Your Legitimate Interests with the GDPR

MailChimp and the Curse of the GDPR

8 IT initiatives to include in your plans this spring

4 NIS Directive Services VARs can provide to their Customers

3 Emerging Innovations in Technology that Will Impact Cyber Security

5 GDPR Things to Consider for your MSSP Offering

Secure your accounts with a passphrase, not a password

5 Last Minute Steps to GDPR Readiness

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

GDPR: Seek re-consent or burn your contacts database, really?

Lead Acquisition at Events, GDPR Style

5 Things to Know About the EU's Upcoming ePrivacy Regulation

Don't let Cyberloafing Crush Productivity

What to do when you receive a "Withdrawal of Consent" under the GDPR

WPA3: Is it just filling in the KRACK’s or do we finally have the wireless security we need?

An Introduction to Operational Technology and it's Security: 5 Key Facts

What GDPR lessons can we learn from the Uber data breach?

Meltdown and Spectre: The Holy Grail of Vulnerabilities

December 2017: The Month in Ransomware

Everything You Need to Know About CCTV and the GDPR

Do you know what "The Right to Forget" in GDPR terms really means?

The 2018 Cyberthreat Landscape - Predictions & Trends

Cybercrime Laws: What Internet Fraud Victims Need to Know

5 Ways the GDPR will Affect VAR Sales People

Everything you need to know about DDoS attacks

Will purchasing contact data lists become illegal under GDPR?

How will GDPR affect how we use LinkedIn?

Wi-Fi Security not all its KRACK’d up to be…

7 GDPR Opportunities for the IT Security Channel

5 Simple Tips for Online Security

3 Reasons why Biometrics are not Secure

Anti-Spam & Phishing Checklist: 5 Techniques which all Mail Filters should have switched on

5 Tips to Protect Critical Infrastructure in the Age of IoT

Was your Email Address found in the World's Largest Spambot?

GDPR Challenge Number 1: Where to Begin?

The Six Commandments of the GDPR

The UK Data Protection Bill 2017 vs. The GDPR

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

What Happened to the World's Most Famous Bitcoin Wallets?

Navigating the GDPR Seas of Third-Party Processing

To be or not to be? Using the Mask of Ransomware

Passwords are not Dead but Complex Ones are

Eight Steps to Prepare for a Summer of Ransomware

WannaCry: The Worlds Cybercrime Wake-Up Call

According to the GDPR, it is In Force Already

GDPR Myths and Monsters

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

Could Cybercrime be the most Profitable Industry in the World?

The Great GDPR Sale

How Secure Is Google Drive?

How To Secure Data In Motion

When Keywords Become Buzzwords We All Lose Out

The GDPR and it's Perpetual Time Stress Torture

Free Public Transport Fares, Courtesy of Ransomware

Low Risk, High Yield: Why Bank Heists Have Gone Cyber

Could Technology Have Helped Prevent the Tesco Bank Breach?

Artificial Intelligence Will Save Encryption from Irrelevance

GDPR is Supposed to Make Business Easier... No Kidding

Shadow IT and Why There's a Hillary Clinton Lurking in All of Us

Red Tape at the Ready, EU Eyes IoT for Regulation

Hear from cybersecurity expert Amar Singh as he leads VSEC Conference 2016

Googles Quest to Shame You into Being More Secure

The GDPR Has Been Invited to Dinner and it's Hungry for First Victims

Have We Become Our Own Worst Cyber-Threat?

DDoS gets Super-Charged with a Dose of IoT

Fancy Bears Hack Team Earns Second Gold Medal

The No-Nonsense Guide to Driving Ransomware Out of Business

Speak up, your iPhone is trying to hear you

Brexit and the GDPR: you can run but you can’t hide…

Share via:

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts