by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying MFA to access cloud services A guide to using multi-factor authentication (MFA) to secure your cloud services. Organisations access their data and services hosted in the cloud over an internet connection. If access control to that information is not secure,...
by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying the five controls to cloud services What are cloud services? Different components of computing are available to users remotely over the internet and payable on demand or by subscription. Cloud services is the collective name for these externally managed...
by Emma P | Jan 18, 2021 | Cloud Services, Secure Configurations
About the cloud The cloud is a term used for a series of remote access services that exist on the internet. When you access services or store information in the cloud, they are not located on your own personal device (e.g. the hard drive on your laptop, your phone or...
by Phil W | Nov 20, 2020 | Secure Configurations, Software and firmware
Removing unnecessary software Supported software Any type of software that you have installed on your computer device will at some point require updating. There are several reasons why software may need to be updated. When manufacturers create and release software,...
by Phil W | Nov 20, 2020 | Secure Configurations, Software and firmware
About software If hardware is the computer’s physical components, software is the set of instructions or programs that ‘run’ on a computer. System software is what is used to manage a computer, an example being the operating system which might be...