The complexities of keeping your DNS secure

DNS management has always been a complex task. The main issue is that it is often a convergence of two different disciplines - system administration and network management. You need system administration skills to compile nameservers, edit zone data files and configure files. You also need networking expertise with a detailed understanding IP addresses and...

Third Party Collaboration Tools: Data Controller

If you are a data controller and play a legal role in the decisions a organisation makes on processing personal data, no doubt you’ve suffered a headache or two assuring you are GDPR compliant. But how recently have you focused your attention on the third party collaboration tools your organisation uses?  Does your collaboration tool meet your compliance needs?  Third...

Connectivity 101: Understanding the Network TAP

It's not uncommon for network engineers to accommodate security and monitoring tools that only have one NIC card or input port. However, lawful intercept and more advanced threat defence systems require access to multiple points in a network to be able to see patterns. When this situation arises, an aggregation TAP is often the best...

Why HR has the most important role in data security

There is a common misconception about IT security that the weakest link is the firewall, server or any other technical component of a organisation’s security infrastructure. The belief is that hackers are always one step ahead leaving the IT team to play catch up.  In reality, the human factor is the real weak link in data security as users go about their day-to-day business handling data of all kinds including confidential information and...

VCW Security Announces Distribution Deal with Garland Technology

VCW has announced a distribution agreement with Garland Technology, the leading provider of network access technology solutions. Under this new agreement, VCW Security will act as a key distributor for Garland’s passive fibre network Test Access Points (TAPs) and network packet broker solutions across the UK. “Partnering with VCW Security is a key part of...

Starting a conversation with IT departments

IT departments generally have traditionally had a bad reputation for blocking innovation. They are naturally risk averse which, in terms of implementation and management of collaboration tools, is an asset that a business can harness to drive security best practice.  One of the most effective strategies to encourage IT personnel to join the conversations your business is having on IT security is...

What questions should you be asking your employees?

Employees using collaboration tools have a duty of care to restrict or control access to the information, especially if it is used to share or store sensitive data. Most of these tools, give individuals access to different levels of data. They enable the creation of partitions that isolate data in terms of business processes or...

Top 5 Conversation Starters to Secure your Online Collaboration

Does your business likes the productivity and agility afforded by collaborative tools but have serious concerns about the security vulnerabilities these tools potentially introduce into the system. Click below to view 5 conversation starters to help you achieve a balance: Employees IT Data Controller HR Internal Comms Learn more about how to use online collaboration...

Is Your Human Firewall Switched On?

Give us the opportunity to show you where the weakness in your corporate network is. Leave your details here and we’ll be in touch to schedule a Free Phishing Audit, Staff Training and a Report. We look forward to working with you!

Layer 8 Signs Up VCW As UK Distribution Partner for Cyber Security Training Solutions

Layer 8, a leading provider of experiential cyber security training solutions, has appointed VCW Security as UK distribution partner.  The partnership will enable VCW to expand its portfolio of market-leading cyber security solutions with a unique solution that allows resellers to provide customers with an additional layer of protection against security breaches by employees that…