1 year ago


Computing Security Secure systems, secure data, secure people, secure business HIGH UP IN THE CLOUDS How secure is your data when it’s no longer under your direct control? NEWS OPINION INDUSTRY COMMENT CASE STUDIES PRODUCT REVIEWS DATA BREACH TREMORS Stock prices sent crashing, reputations left in tatters HOODED THREATS The so-called ‘safe’ systems that are easy prey for hackers TOUGH CHOICES TO BE MADE Going mobile can be highly rewarding, but always beware of the downsides Computing Security July/August 2017