<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Entrust Datacard Passwordless Webinar Series this Summer!

Infinigate Appoints Justin Griffiths as UK Managing Director

As The World Changed Forever, So Did Cybercriminal Behaviour

COVID-19: Ruthless Ransomware Authors Attack Hospitals

How Certificate Trusts Work and Why They Are Causing Trouble

How Secure is Zoom and Should I Be Using It?

How to Secure Your Remote Access from the Changing Threat Landscape

Five Considerations for a COVID-19 Ready Mobile Workforce

Zigbee IoT Vulnerabilities Let the Side Down... AGAIN

What are CIS Benchmarks and Why are they so Important?

Dixons Fined £500,000 for Data Breach of 5.6m Payment Cards

What are AS4 File Transfers and Why are they so Important?

ECJ Ruling on Cookie Laws Finds Most Websites Non-Compliant

Security Lessons from the Worst Data Breaches & Cyber Attacks of 2019

The Top 4 SECaaS Solutions Set for Mass Adoption

How to Mitigate IoT Security Risks with Aerohive - VSEC CyberTalks

Why Security-as-a-Service (SECaaS) is Getting all the Attention

Five Areas of Your Network Which Could Benefit from Automation

British Airways hit with a Potential £183M Fine for GDPR Data Breach

5 Things All The Best Incident Response Plans Include

Data Breaches and the GDPR - 1 Year Later

The Top 5 Cloud Security Challenges Haunting Every IT Manager

3 Steps to Secure your Enterprise API’s…

Making your MSP Offering GDPR Friendly - 4 Things to Consider

SMB's: Cybercrime's Number 1 Target

Everything the IT Security Channel Needs to Know About Machine Learning

What is IoT and What Security Concerns Does it Bring to the Workplace?

3 Things you probably didn't know about Multi-Factor Authentication (MFA)

Women in IT: 7 ways to close the gender gap

3 Worst Data Breaches From 2018 & How to Avoid Them

Artificial Intelligence, Machine Learning and more

Mighty Amazon Cut Down in Black Friday Data Breach

4 Reasons why the Future is Cloud

The Truth About Cloud Hosted Services and the GDPR

How to Choose the Right MSSP Provider (Top 5 Criteria)

UK's Top 4 Regulations Overlap

5 Cloud Solutions That You Didn’t Know Existed

Cloud Hosted Software is more secure than your Data Centre (4 Reasons Why)

Does GDPR Require Double Opt-in Consent?

Everything you need to know about the NIS Directive

5 Tips on How to Write a GDPR Ready Privacy Policy

GDPR & Personal Data in the Public Domain

Exercising Your Legitimate Interests with the GDPR

MailChimp and the Curse of the GDPR

4 NIS Directive Services VARs can provide to their Customers

5 GDPR Things to Consider for your MSSP Offering

5 Last Minute Steps to GDPR Readiness

GDPR: Seek re-consent or burn your contacts database, really?

Lead Acquisition at Events, GDPR Style

5 Things to Know About the EU's Upcoming ePrivacy Regulation

What to do when you receive a "Withdrawal of Consent" under the GDPR

WPA3: Is it just filling in the KRACKs?

An Introduction to Operational Technology and it's Security: 5 Key Facts

What GDPR lessons can we learn from the Uber data breach?

Everything You Need to Know About CCTV and the GDPR

Do you know what "The Right to Forget" in GDPR terms really means?

Cybercrime Laws: What Internet Fraud Victims Need to Know

5 Ways the GDPR will Affect VAR Sales People

Will purchasing contact data lists become illegal under GDPR?

How will GDPR affect how we use LinkedIn?

7 GDPR Opportunities for the IT Security Channel

3 Reasons why Biometrics are not Secure

Anti-Spam & Phishing Checklist

GDPR Challenge Number 1: Where to Begin?

The Six Commandments of the GDPR

The UK Data Protection Bill 2017 vs. The GDPR

Top 5 Focus Areas for IT Security Budgets in the Coming 12 Months

What Happened to the World's Most Famous Bitcoin Wallets?

Navigating the GDPR Seas of Third-Party Processing

WannaCry: The Worlds Cybercrime Wake-Up Call

Five Things to Remember About the PECR

According to the GDPR, it is In Force Already

GDPR Myths and Monsters

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

Could Cybercrime be the most Profitable Industry in the World?

The Great GDPR Sale

How Secure Is Google Drive?

How To Secure Data In Motion

When Keywords Become Buzzwords We All Lose Out

The GDPR and it's Perpetual Time Stress Torture

Could Technology Have Helped Prevent the Tesco Bank Breach?

Artificial Intelligence Will Save Encryption from Irrelevance

GDPR is Supposed to Make Business Easier... No Kidding

Googles Quest to Shame You into Being More Secure

The GDPR Has Been Invited to Dinner and it's Hungry for First Victims

The No-Nonsense Guide to Driving Ransomware Out of Business

Speak up, your iPhone is trying to hear you

Brexit and the GDPR: you can run but you can’t hide…

Share via:

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts