This is a NEW POST
Testing ability to add a new post: 25 Jan 2026
☎ (571)-406-4922
✉ contact@vigorisconsulting.com
Network Security Defined In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Network Security from the most secure and efficient enterprise firewall. Network security is an ongoing challenge as organizations become more distributed, applications…
I think it’s fair to say, 2017 wasn’t a great year for cyber-security. We saw a large number of high-profile cyberattacks; including Uber, Deloitte, Equifax and the now infamous WannaCry ransomware attack. Despite the constant flow of security updates and patches, the number of attacks continue to rise. This raises the question…will 2018 be better…
Boards ramp up investment in data privacy and security in rush to become GDPR compliant and avoid data breaches, says a Harvey Nash/KPMG CIO Survey. The survey found almost a quarter (23 percent) more respondents than in 2017 are prioritizing improvements in cyber security as cyber crime threats reach an all-time high, while managing operational…
Throughout past history, civilian commercial entities have not been the primary targets of warfare and have even been avoided as targets. In the earliest days when such groups existed, they did not make feasible targets in and of themselves. Such organizations existed within the physical boundaries of nation-states, such that attacks upon them could only…
A significant percentage of IT systems are cloud-based, according to a CompTIA survey of 502 U.S companies. The cloud is a key enabler for emerging technology, suggests the poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, CompTIA…
The aim of this study was to determine the prevalence of cyberstalking victimization, characteristics of victims and offenders, and the impact of cyberstalking on the victims’ well-being and mental health. An online survey of 6,379 participants was carried out, involving users of the German social network StudiVZ. Subjective mental health status was assessed with the…
Australian union officials who ran fake Black Lives Matter Facebook page fired National Union of Workers ‘deeply distressed and appalled’ about sham site, which had twice as many followers as official page Ian Mackay who was an Australian union official from the National Union of Workers has been stood down amid claims he was involved…
As technology advances at warp speed, companies should consider how their M&A programs can take advantage of big data to make better and faster decisions. Watch the video below to hear from Mitch Berlin and Sid Khosla, about how big data, analytics, cybersecurity, cloud computing, and social media play a role in developing a strategic…
It’s common for terms such as cyber threats, vulnerabilities and risks to be conflated and confused. This post aims to define each term, highlight how they differ and how they are related to one-another. Cyber Threats Cyber threats, or simply, threats refer to circumstances or events with the potential to cause harm by way of their outcome. A few examples of…