Securing the WLAN
Martin Courtney asks how IT departments handle security and user access management on wireless networks
Mobile computing has truly come of age in the past couple of years. This is due in part to portable wireless devices combining internet access, email and mobile business applications with voice-calling...
More on Security Technology
Thank Zuck it's Friday #9 - Home Office 'super database', the software reseller claiming £270m from Microsoft and social media data breaches
This week on the IT news podcast the team discusses the Home Office's 'super database' on race, health and biometrics, the British software reseller bringing at £170m claim against Microsoft and the recent data breaches involving both Facebook and LinkedIn....
Booking.com fined €475,000 for late reporting of data breach
Travel firm delayed reporting the breach by 22 days, exceeding the 72-hour limit
Ransomware attack alert! The tell-tale signals to look for
Patterns of unusual behaviour are the clearest signal of an attack, not programmes or files
Petlog accused of mishandling details of customers and pets
A database migration appears to have caused a data breach, with pet owners able to see other people's details and potentially register their pets as their own