How data protection tools support GDPR compliance

How data protection tools support GDPR compliance

The deadline for GDPR has come and gone and a year has passed, and while some Companies were completely prepared for this new regulation, there are others that are still in the very early stages. It’s a very complex set of regulations but it is not something that...

Gain Control and Visibility of Your Web Interaction

Gain Control and Visibility of Your Web Interaction

Many cyber attacks these days are looking to assume control of user accounts, gain access to valuable information and exfiltrate this information to use for criminal activities.  Asystec works with vendors who look to give visibility during the various steps in the...

Ransomware, breaches and new data regulation?

Ransomware, breaches and new data regulation?

Data lives in many places and many forms in today’s world, SaaS applications, file shares, databases, business applications, whether this data is on premise / off premise or in the cloud, each in their own silo – how can an organization cover off these requirements....

Are managed security services the future?

Are managed security services the future?

Just another brick in the wall: I have heard it said that a well-managed device is a secure device, and where this binds an element of truth, it is only the beginning of the story.  When I first came to the IT arena, the security of a desktop was reported on based on...

Data, data – wherefore art thou data?

Data, data – wherefore art thou data?

Surprisingly, even with all the talks and events circulating with regard to the 'looming' GDPR, a lot of companies that we talk to have no plans in place to address the strict regulations. Even more surprising is that we still hear 'what's that?' when we mention the...

Key concerns with a managed security service

Key concerns with a managed security service

A key concern many have is trusting a managed service to know their business, but with a global shortage of cybersecurity professionals many companies are struggling to recruit and maintain their in-house security capabilities. We're seeing increasingly more...

User Behaviour Analytics is key to IT Security

User Behaviour Analytics is key to IT Security

Every cyber attack and potential data breach begins with some illicit activity. Of course the entire exploit, whether successful or not is illicit. But it is in detecting that first step, often tiny and apparently insignificant, at the earliest possible stage the all...

Gearing up for the New GDPR

Gearing up for the New GDPR

We, the public, all want to believe that any company or organisation who we disclose our personal information to is doing their up-most to ensure our data doesn’t fall into the wrong hands. These regulations transform that ‘belief’ into an assurance. What can your...

Why use Managed Security Service Providers

Why use Managed Security Service Providers

Security has never been out of the public eye, but lately, it seems, it has rarely been out of the headlines.  Is it time for organisations to admit that they simply cannot keep pace with the volume, velocity and variety of threats now faced? Is it time for enterprise...