Jim Cook

From the author

data privacy

Why taking a layered approach delivers the best IT security protection

A layered cybersecurity approach that combines in-network and out-of-network solutions will help filter out known threat...

Why coronavirus has made the password manager a must-have security tool

As phishing scams and credential theft are spreading fast, a password manager is the best form of protection for busines...
cybersecurity breach

Five top tips for effective IT security in 2018

An effective IT security strategy allows you to profit from the benefits of technology while minimising its associated r...