Wales

Hardware and Devices

PBX Fraud

Private Branch Exchanges (PBX) are telephone systems used by small and medium businesses for internal and external communications. They are frequently targeted by criminals who exploit the technology by committing what is known...

Network & Computer Security

Before the advent of the internet, network and computer security was relatively simple as organisations needed to secure only the ‘perimeter’ to their systems. Computers were connected by networks and with the exception of...

Apple Mac Computers

Apple Macs are less vulnerable to attack by malware than Windows PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs increases for both business...

Linux

This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations. Most modern Linux distributions provide some basic security features (automatic...

Disposal

Your computers, tablets and smartphones are used to store and communicate data which – if in the wrong hands – could be used to compromise the safety and security of your organisation and its employees. This data could be...

Physical Security

Physical security is equally important as online security in protecting your computers, mobile devices, business and employees against crime and certain other issues. This page covers physically protecting your equipment and data...

Mobile Devices

Every organisation relies heavily on mobile devices – smartphones and increasingly tablets – to maintain efficient communication, both with customers and suppliers, and connection with the business itself. This applies as...

BYOD

The practice of employees, contractors and other people working in your organisation using their own laptop computers, mobile devices and portable storage in their work is known as ‘Bring Your Own Device’ or BYoD. It is a...

In partnership with