Blog

IMPENETRABLE. The activereach blog is about network security in simple terms. Our aim is to share vital knowledge with business people across all functions so that they can understand the impact of emerging security trends and gain critical insight into how these could be adopted in their organisations. Security so good, it’s impenetrable.

Blog

GDPR: Compliance Timeline For Implementing Technological Transformation (Part 4 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to Incapsula’s 2016 report, 51.8% of web traffic was caused by bots – total bot traffic now exceeds total human traffic. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →

Blog

GDPR – Is Data Encryption Really Necessary?

Max Pritchard

It’s no secret that the proposed EU General Data Protection Regulation is technology-agnostic. It demands that companies implement proportionate, cost-effective controls to protect the personal data of EU residents, as well as enabling data subjects to exercise their rights over their own personal data. The only technology areas specifically mentioned in the regulation, currently, are pseudonymization and data encryption.

more →

Blog

GDPR: Technology Goals Aid Business Transformation And Legal Compliance (Part 3 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data.

This post (Part 3) looks at some real life scenarios whereby organizations have effectively reduced their data security risk, and examines some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Top 6 Considerations For Choosing An Active Directory Disaster Recovery Solution

This month we are sharing a blog originally written by our technology partner Semperis.

Active Directory® is heavily relied upon by many organizations and in today’s world dominated by technology it is important to always have a plan B if ever technology lets you down.

Here is a question, if everyone knows AD® uptime is critically important, why do so many experts agree to live with an under-performing AD Disaster Recovery plan?

more →

Blog

GDPR: Taking A Risk-based Approach To The Technological Measures Required To Protect Data (Part 2 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In this post, we highlight the major provisions in the GDPR for technological measures to protect data, and examine the importance of taking a risk-based approach to GDPR technology investments.

more →

Blog

GDPR Compliance: The Legal & Financial Consequences Of Technology Failure – A Guide For Security Professionals (Part 1 of 5)

The General Data Protection Regulation will change the way you do business

The EU General Data Protection Regulation (GDPR) comes into force on May 25, 2018. Every organization — regardless of its location — doing business with EU customers will need to make changes to its technology, processes, and people to comply with the new rules.

more →

Blog

Say Goodbye To Moats And Castles With A New Approach To Remote Application Access

This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.

more →