A New Data Security Solution

Posted on September 26, 2017 by John Lynch |Leave a comment|

We are pleased to announce the launch of our new data security product - Quatrix Vault®.

Continue reading →

Tokenisation Addresses Cyber Security Risk and Compliance. Here’s Why

Posted on June 16, 2017 by John Lynch |Leave a comment|

Information security is something businesses do not dare to ignore these days, be it a huge corporation or a modest startup.

On average a data breach costs $4m and this is already an argument for having a proper security system in place.

Continue reading →

Chinese Officials Say the Great Firewall is Too Strict

Posted on May 18, 2017 by John Lynch |Leave a comment|

Over the last few years, China has become renowned for not only its strict culture but its highly-regulated online world too. The most notorious part of this online regulation being the ‘Great Firewall of China’ –the Chinese government’s firewall which regulates its domestic internet.

Two decades after its implementation, the government believe it has protected Chinese internet users’ privacy and national interests. However, some officials are now suggesting the regulation and censorship has gone too far.

Continue reading →

Why Regularly Changing Your Password Puts You More at Risk of Attack

Posted on April 25, 2017 by John Lynch |Leave a comment|

You may think that constantly changing your password would minimise the likelihood of hackers gaining access to your accounts and ensure your online safety. But some experts are claiming that regularly resetting your password could have the reverse effect.

Continue reading →

The Problem With Email Communication in China

Posted on October 13, 2016 by John Lynch |Leave a comment|

Email security is a big issue right now. Hillary Clinton may be the most famous (or infamous) story concerning the safety of email messaging, but across the world individuals and organisations are finding that email communication isn't as safe as it needs to be.

In China, data security is always somewhat of a hot potato. It's an open secret that Chinese Government officials spy on internet traffic and analyse emails (although they officially deny this), while terms such as 'Ferrari', 'democracy' and 'Tianenmen Square', among hundreds of others, are blocked from search results in the country's version of Google, Baidu.

And when it comes to email, the People's Republic has a number of issues with that too. I take a look at China's problems with email: Continue reading →

7 Security Problems When Sending Emails

Posted on October 12, 2016 by John Lynch |Leave a comment|

 

You may think that sending an email is much more secure than writing a letter. After all, the receiver needs to sign in with their password to receive it. But, in fact, there are a number of security flaws when it comes to sending sensitive information this way.


Here are a few common threats to your secure mail and how Maytech’s experts would recommend you remedy this.

Continue reading →

Five Emerging Threats Enterprise Security Must Not Ignore

Posted on August 03, 2016 by John Lynch |Leave a comment|

Cybercrime is an ever-evolving industry that is scamming businesses big and small out of millions of pounds each year. So, it’s important to remain knowledgeable and up-to-date on all of the latest scams, plus how to best protect your organisation’s network.

Continue reading →

GCloud 8: What is it and How Can it Secure File Transfer for Governments?

Posted on July 04, 2016 by John Lynch |Leave a comment|

Finding well-respected, accredited technology providers for government services is now easier than ever thanks to GCloud 8, and Maytech is a Digital Marketplace organisation. Continue reading →

Government File Transfers and the Latest Consultations

Posted on June 22, 2016 by John Lynch |Leave a comment|

The end of the financial year marked the closing date for submissions to the Better Use of Data in Government consultation and the Cabinet Office is now analysing the feedback it received.

Continue reading →

Apple vs. The US Government: Unlocking the Answer to a Crime

Posted on April 22, 2016 by John Lynch |Leave a comment|

It was announced last week that the month long legal battle between technology giant Apple and the US government has come to a conclusion with the FBI gaining access to the iPhone in question by ‘other means’.

Continue reading →

Subscribe

Recent Entries