Security

How Droplet Containers secure legacy apps and servers

Posted on

Security

How Droplet Containers secure legacy apps and servers

Legacy apps and servers pose significant challenges to organisations across the world. Containerising them protects them from security threats which helps you achieve compliance and delivers significant cost savings when it comes to deploying apps, not only in acquisition, but also in management costs and lower infrastructure overheads.

By | 04/06/2021

Security

If it’s NSFW, it’s Not Safe for Your Employees to Share

Posted on
NSFW Content Blog Featured Image

Security

If it’s NSFW, it’s Not Safe for Your Employees to Share

The boundaries between our work and home lives have never been more blurred. With unsuitable content hiding on mainstream platforms, it is no surprise that downloading inappropriate Not Safe for Work (NSFW) images and video is a very real concern for organisations in a world where work and home devices commonly overlap.

By | 23/03/2021

Security

Why it’s Time to Ditch the Password

Posted on
Its Time to Ditch the Password Blog Featured Image

Security

Why it’s Time to Ditch the Password

37% of cyber attacks on corporate networks involve weak or stolen passwords. The lesson is that you certainly can’t rely on passwords. And you can’t really rely on traditional two-factor authentication either, as token-based authentication is susceptible to being hacked using simple phishing. MFA is now the way forward for any IT or security professional worth their salt.

By | 16/03/2021