Cybersecurity Jargon Buster

June 30, 2019

An enhanced means of verifying identity that requires you to present two pieces of evidence – your credentials –in order to gain access to an account or other secure/restricted area. Your credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card or a token device), or something you are (like your fingerprint, voice recognition or other biometric). 2FA is a form of Multi-Factor Authentication.

Spotlight

Three.

We want to make life easier for our customers by helping them get the most out of their mobile devices, offering real value from the services we provide and by removing the barriers that frustrate them. Since our launch in 2003, we have done things differently to other mobile operators. While others blocked internet services like Skype, we embraced the great things the internet brings to mobile. Our Feel At Home offer lets our customers call and text the UK and use data out of their UK allowance when abroad in a host of countries.

OTHER WHITEPAPERS
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Cybersecurity Services

whitePaper | October 17, 2022

Our approach to cybersecurity includes a holistic set of services spanning Risk Assessments, Security Patching, Advisory Services and Managed Detection and, Response (MDR).

Read More
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More

Spotlight

Three.

We want to make life easier for our customers by helping them get the most out of their mobile devices, offering real value from the services we provide and by removing the barriers that frustrate them. Since our launch in 2003, we have done things differently to other mobile operators. While others blocked internet services like Skype, we embraced the great things the internet brings to mobile. Our Feel At Home offer lets our customers call and text the UK and use data out of their UK allowance when abroad in a host of countries.

Events