Why prioritising user experience is vital in network connectivity

02 August 2022

Song Toh, VP global network services, Tata Communications

Song Toh, VP global network services, Tata Communications

In today’s hybrid and evolving work landscape, business leaders must prioritise the user experience of their distributed workforces.

When the pandemic began, many enterprises quickly moved their business operations to the cloud to better manage remote working.

As a result, enterprises had to scale up their remote user connectivity infrastructure so all employees could connect to their business applications while working from home.

However, the updated infrastructure was often layered on top of legacy network architecture, resulting often in inconsistent connectivity performance and thereby impacting employees’ user experience. In fact, end-user complaints about application performance due to excessive slowdowns, network congestion, and performance degradations increased by 60%, Forbes reports, during the lockdowns.

Find out more

CREST provides commercially defensible scoping, delivery and sign-off recommendations for penetration tests

01 August 2022

CREST, the international not-for-profit, membership body representing the global cyber security industry, has announced the release of its CREST Defensible Penetration Test, a specification that provides recommendations on how penetration tests should be scoped, delivered and signed off.

With significant growth in the numbers of penetration tests being carried out around the world, the need to define best practice has become increasingly important. CREST has worked alongside industry recognised and peer-selected experts to define a minimum set of expectations associated with a penetration test.

Find out more

Confidential data held by legal firm copied in attack

01 August 2022

Data stored by a Derby legal firm has been exploited in a cyberattack, according to a local report.

Derbyshire Live reported that a hack targeted at Nelsons saw clients' personal details accessed by cyber criminals.

Two of Nelsons’ clients, who wished to remain anonymous, say they only received notice that their details had been accessed six weeks after the incident, which took place May 30.

One client added that they have been informed that confidential data which gives details about their identification was hijacked during the cyberattack.

Find out more
How can MSPs deliver the best security to SMEs?

01 August 2022

By Mathivanan Venkatachalam, vice president, ManageEngine

Cyberattacks are one of the biggest concerns along with data breaches, spyware, ransomware, and phishing attacks for any organisation today. SMEs are more at risk of cybercrime than enterprises and are inclined to services that maintain compliance and data security.

MSPs strive to maintain a strong security layer around each organisation’s network and be ever ready with reactive measures in case security is compromised. An SME’s ROI from their network security depends on their MSP’s security-focused tools and their customised strategies derived to manage each customer’s network.
To aid MSPs in navigating any potential threats and risks, vendors offer remote monitoring and management (RMM) solutions that prioritise built-in security-centric capabilities, including advanced vulnerability management, browser security management, and application and device security.


Find out more