10.jpg

News & Opinion

Gain the edge on the world of business technology and cyber security

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

on 13-Jun-2019 11:56:14 By | Keith Smith | 0 Comments | Cybersecurity
One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magical cave containing vast treasures. Equipped with the secret password he waits until they depart and makes for the entrance of the magic cave. Once upon it, he merely repeats the words “Open Sesame” and with that enters and makes off with the treasure.
Read More

5 Traits to Look for in an Effective CIO

on 05-Jun-2019 09:57:04 By | Andrew Allen | 0 Comments | Management Strategy
There are times when you do not have the technology expertise required within your company to plan a project or to solve a problem that feels like it is crippling one or more business operations. There is no need to feel discouraged.
Read More

Aabyss - Dark Web Experience

on 03-Jun-2019 12:43:50 By | Greg Jones | 0 Comments | IT News
Have you ever wondered about the Dark Web or would you like to see a LIVE disaster demo? Why not spend a morning exploring the Dark Web in a safe and secure environment with Aabyss!
Read More

Aabyss Ltd & Tandem Systems Ltd Announce Merger

on 01-Mar-2019 13:28:07 By | Greg Jones | 2 Comments | Aabyss News
Aabyss Limited announces the merger of Aabyss’ and Tandem Systems Limited’s business operations. As Aabyss welcomes Tandem’s clients into the larger company, it also embraces the employees who are joining the Aabyss family.
Read More

Growth Starts with Goals!

on 14-Jan-2019 11:41:55 By | Greg Jones | 0 Comments | Strategy
The new year has been ushered in and we have found ourselves with another 365 opportunities in which to fulfil our aspirations. Figuratively speaking, most people take the new year as an opportunity to experience a rebirth of sorts. New diet, new hobbies, new values, new standards, new objectives. All admirable and essential if we are to evolve and grow, but they all represent aspirations and not, reality!
Read More

Merry Christmas From Aabyss!

on 10-Dec-2018 17:05:43 By | Greg Jones | 0 Comments | Aabyss News
Now the Aabyss Christmas tree is up and just before the social media platforms get bombarded with Christmas post’s we would like to get this out!
Read More

Festive Fraud!

on 07-Dec-2018 13:50:43 By | Greg Jones | 0 Comments | Cybersecurity Tips & Tricks
As the hustle and bustle of Christmas kicks in, make sure you don’t fall prey to festive fraud! A recent report by Action Fraud found that last year 15,024 people were conned out of £11 million by fraudsters over the Christmas period!
Read More

Email Security Best Practice Guide

on 04-Dec-2018 13:06:59 By | Keith Smith | 0 Comments | Cybersecurity Security Tips & Tricks
Despite the ever-increasing amount of communication applications, email remains and is likely to remain the primary method of communicating important information between employees and customers. We use it to verify our identity, send our thanks or apologies, invoices, offers, and information amongst many other vital things. It is something we demand and depend upon if we are to interact smoothly with our partners and clients. Yet many of us don’t require or at least practice security standards that befit such an essential and often sensitive act. Startling is that the writing is on the wall when it comes to email security!
Read More

What To Consider When Implementing Multi-Factor Authentication

on 28-Nov-2018 13:01:00 By | Keith Smith | 0 Comments | Cybersecurity Password
  Trust is placed in friends and family and earned by those we don’t know. Our communities depend on it and will not arise spontaneously without it. Trust is an integral part of our lives. Problematic is that in today's hectic business environment, we are often forced to interact at a moment's notice with people we just don’t know. We may be required to admit them access to critical infrastructure that underpins the very foundation of our business. Even when we know them, do we really know it's them we are interacting with the entire time?
Read More

How To Know And What to Do When Your Password Is Compromised - 2018

on 23-Nov-2018 09:11:00 By | Keith Smith | 0 Comments | Password Security
Malicious actors are unscrupulous and will invest large amounts of time attempting to profit from your personal information. Unfortunately, it is estimated over half a billion stolen passwords are floating around on the internet, many of them on sale to the highest bidder. Being on the receiving end of this illicit trade, can be life-changing. But its not all bad news! Thankfully there are helpful practices you can implement right now to mitigate this problem. Here’s our guide on how to know and what to do when your password is compromised.
Read More