Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Taking Care of The Little Things

Andy Powell

Resilient Firewalls, DDoS Mitigation, Multi-factor Authentication are the sexy parts of IT but can be easily brought down if the small things are ignored. By ‘small’ things I really mean the more mundane tasks linked to good IT security;

  • Anti-Virus
  • Admin Rights 
  • Patching
  • SSL Certificates
  • Testing

Anti-Virus

If your AV is not up-to-date and a network user accidentally clicks on a
link, opens an attachment or falls for a phishing scam, it could result in
a destructive virus spreading around the network, locking users out of
important data or destroying the data. 

more →

Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

Sharon Holland

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →

Blog

Penetration Testing vs DDoS Testing

John Baldock

We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers.  However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough.  This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.

more →