VCW expands operations to meet increasing business demand

VCW Security is expanding to meet the increasing demand for IT security and infrastructure management solutions.  The company has announced the appointment of Mark Thomas as Regional Sales Manager and Gordon Laverick as Senior Business Development Manager. In these new roles, they will be responsible for building relationships with the channel reseller partners and providing...

Failover and Failback in 2018

Businesses today are spending millions of pounds on disaster recovery infrastructures. Business continuity is essential yet 60% of disaster recovery attempts end in failure.  There are a number of reasons for this, not limited to the complexity of infrastructures, numerous stakeholders, high change rates and disaster testing costs.  The situation is compounded by compliance issues including GDPR and businesses have no real way...

The complexities of keeping your DNS secure

DNS management has always been a complex task. The main issue is that it is often a convergence of two different disciplines - system administration and network management. You need system administration skills to compile nameservers, edit zone data files and configure files. You also need networking expertise with a detailed understanding IP addresses and...

Third Party Collaboration Tools: Data Controller

If you are a data controller and play a legal role in the decisions a organisation makes on processing personal data, no doubt you’ve suffered a headache or two assuring you are GDPR compliant. But how recently have you focused your attention on the third party collaboration tools your organisation uses?  Does your collaboration tool meet your compliance needs?  Third...

Connectivity 101: Understanding the Network TAP

It's not uncommon for network engineers to accommodate security and monitoring tools that only have one NIC card or input port. However, lawful intercept and more advanced threat defence systems require access to multiple points in a network to be able to see patterns. When this situation arises, an aggregation TAP is often the best...

Why HR has the most important role in data security

There is a common misconception about IT security that the weakest link is the firewall, server or any other technical component of a organisation’s security infrastructure. The belief is that hackers are always one step ahead leaving the IT team to play catch up.  In reality, the human factor is the real weak link in data security as users go about their day-to-day business handling data of all kinds including confidential information and...

VCW Security Announces Distribution Deal with Garland Technology

VCW has announced a distribution agreement with Garland Technology, the leading provider of network access technology solutions. Under this new agreement, VCW Security will act as a key distributor for Garland’s passive fibre network Test Access Points (TAPs) and network packet broker solutions across the UK. “Partnering with VCW Security is a key part of...

Starting a conversation with IT departments

IT departments generally have traditionally had a bad reputation for blocking innovation. They are naturally risk averse which, in terms of implementation and management of collaboration tools, is an asset that a business can harness to drive security best practice.  One of the most effective strategies to encourage IT personnel to join the conversations your business is having on IT security is...

What questions should you be asking your employees?

Employees using collaboration tools have a duty of care to restrict or control access to the information, especially if it is used to share or store sensitive data. Most of these tools, give individuals access to different levels of data. They enable the creation of partitions that isolate data in terms of business processes or...