How Will the 2018 GDPR Changes Work

In May 2018, a number of EU member states will adopt new data privacy legislation known as the General Data Protection Regulation, which intends to update and streamline data privacy laws across the EU. The changes will ensure a greater deal of accountability for protecting people’s personal data in a workplace and sets out a […]

Read More

An Introduction to ITIL Management

The Information Technology Infrastructure Library (ITIL) is a framework of best practices for the management of IT services, helping companies to maintain a high standard of IT management and respond to technical problems quickly and effectively. Anyone in a business can educate themselves on ITIL and qualify for advancing levels of certification until they gain […]

Read More

Hacking Hat Colours Explained

When people hear the term ‘hackers’ in relation to technology, they often assume that it refers to criminals who use their vast technical expertise to instigate chaos online. While some hackers certainly meet this description, a hacker is actually anyone who can demonstrate the aptitude of accessing a computer system , whether for fair or foul […]

Read More

Public Wi-Fi Growth in Europe

Public Wi-Fi has grown so rapidly across Europe that we almost take it as a given at cafés, restaurants, museums and other public places nowadays. In 2013, there were 16.8 million public Wi-Fi spots in Europe. By the end of next year, that figure is projected to surpass 108 million. This infographic charts the recent […]

Read More

Next Gen Firewalls – A Brief Overview

Next gen firewalls (NGFWs) are deep packet inspection firewalls which provide a level of security notably greater than that of traditional firewalls by moving beyond port/protocol inspection. They track layers 2 to 7, whereas traditional firewalls only tracked layers 2 to 4. This infographic outlines the basic functions and main features of NGFWs, explains how […]

Read More

Software-Defined Networking 101

Since the introduction of software-defined networking (SDN), network administrators have been able to manage networks by abstracting low-level functionality. The primary objective of SDN is to make networks easier to manage and to better suit the bandwidth-consuming applications that are used in today’s computing practices. This infographic outlines the main characteristics of SDN, explains the […]

Read More

Beware the Threat of Ransomware – Infographic

Have you ever been working as normal on your computer and then been interrupted by an unexplained, full-screen message demanding payment of a specified sum within a specified time limit? If this scary situation seems familiar, you’ve most likely been the target of a ransomware attack. This infographic outlines how ransomware works, who are the […]

Read More

The Destructive Impact of DDoS Attacks – Infographic

Distributed Denial of Service (DDoS) attacks occur where multiple computers are used to target one system, flooding it with so much incoming traffic that it cannot operate. This can have a massive impact on the targeted site, which can often be a school or a hospital, and even an hour-long attack could lead to five-figure […]

Read More

The IT Manager’s Guide to Securing Your Cloud – Infographic

Cloud computing is now a core activity for many businesses, with managers and staff regularly needing to access critical files from outside the office. It is a revolutionary facet of business communication, but some companies are reluctant to introduce cloud computing due to fears over data security. This infographic outlines how companies can maximise the […]

Read More

Building a Network Infrastructure – Infographic

With so much business taking place through Internet technologies in today’s corporate world, it is essential that any company has a solid network infrastructure in place. This infographic outlines the steps that are involved in the development of a network infrastructure, from determining the components that will be required all the way through to installing […]

Read More