Join other Information Security Professionals and Subscribe

to receive monthly insights on securely enabling business transformation

Bridgeway Insights

Welcome to Bridgeway's Blog - bringing you news, views and opinions on issues that matter to you.

The purpose of this blog is to help you in your job and offer a better understanding of security. If you have any thoughts on the content or you'd like us to cover something then please don't hesitate to tell us.

Posted by Lisa Higgins 7 March 2019

It has never been more vital for public sector organisations to safeguard personal data against unprecedented cyber threats. Risks from cyberattacks, with email being the main attack vector, have the potential to cripple services and affect day-to-day functioning of public administration at all levels.

Continue reading...
Posted by Lisa Higgins 26 February 2019

 

Continue reading...
Posted by Lisa Higgins 26 February 2019

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 12 February 2019

Consider all of your business data. Every email, instant message, document, image, video, article, spreadsheet... It’s a larger collection than you think and these days, in the highly regulated world of business, organisations need to account for and store their data for long periods of time.

Continue reading...
Posted by Lisa Higgins 7 February 2019

Despite all the new ways to share and receive, email remains the tool of choice for most business communication. From sending important documents to day to day collaboration and always on, anywhere access, email is central to productivity. So if your email system goes down, due to a planned outage or service migration, it can potentially cost millions in lost productivity, revenues and reputational damage. Not to mention leaving users frustrated.

Continue reading...
Posted by Lisa Higgins 24 January 2019

Many organisations think their current email security systems are up to the job of protecting them. Unfortunately traditional email security strategies can fall short of keeping organisations safe.

So what can you do? Here are Bridgeway's top tips:

Continue reading...
Posted by Lisa Higgins 16 January 2019

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 18 December 2018

What do BBC Online, Facebook, Netflix, Alexa, Office 365, Google Docs, HubSpot, Twitter, Dropbox, Linked In, Salesforce and WhatsApp have in common?

Continue reading...
Posted by Lisa Higgins 4 December 2018

Christmas festivities are almost upon us. With mulled wine ready to be consumed by the gallon across the UK and staff busy thinking about secret Santa and office parties, it’s a time for slowing down and celebrating another year that's passed. But as the workforce relaxes a little, what does that mean for information security? What happens if staff devices are left in a taxi or bus, or taken from someone’s bag? It’s a time for goodwill, but also a time for vulnerability when it comes to corporate data.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 5 November 2018

 

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 24 October 2018

During this current decade we have gone from $37bn to over $96bn worth of annual information security spending, yet by whatever metric you want to use - the number of data breaches or the number of viruses for example - the picture is rather bleak. We’re spending more money but we’re getting more security breaches, so something isn’t working. The focus needs to shift; Mobile First or Cloud First is all well and good, but what about the user?

Continue reading...
Posted by Louisa Mackintosh 6 September 2018

Continue reading...
Posted by Louisa Mackintosh 28 August 2018

You may be aware that MobileIron introduced 'per user' licensing a couple of years ago. This is a surprisingly powerful way to achieve substantial cost savings for your mobility project, as each user licence can cover up to three assigned devices, yet each user licences costs roughly only 50% more than an equivalent single device licence cost. 

Continue reading...
Tags
IronWorks
Posted by Louisa Mackintosh 22 August 2018

The risks posed by inactive (dormant) users present on an organisation's servers are a potential goldmine for malicious attackers but also serve to highlight poor user management processes. Indeed, both the ISO 27001 control framework and the PCI DSS information security standard require organisations to monitor, act, and also report on these inactive users.

Continue reading...
Tags
IronWorks
Posted by Jason Holloway 16 August 2018

We believe mission-critical apps are at the very heart of modern digital transformation. Yet, reporting to senior management how these are being utilised across your estate - and whether they are being kept up to date or not - has never been easy.

Continue reading...
Tags
IronWorks
Posted by Louisa Mackintosh 16 August 2018

If you’re looking at implementing CASB (cloud access security brokers), you’ve probably begun to realise there are a myriad of options out there and they’re all designed slightly differently. So how do you know what you need?

Continue reading...
Tags
Bitglass
Posted by Louisa Mackintosh 26 July 2018

Materials costs rose by 4.8% between February 2016 and February 2017. This coupled with a chronic shortage of skilled labour, means construction firms across the UK are reporting increased pressure on margins, leading many firms to absorb these costs in an attempt to stay competitive. But how sustainable can that be?

Continue reading...
Posted by Louisa Mackintosh 23 July 2018

Often we can overlook the need for the right level of skills to successfully administer our EMM software on an ongoing basis. Being trained on your EMM or MDM solution is crucial when dealing with new technology, so that your leading-edge technology stays that way and doesn’t become a bleeding-edge project instead. It will give you the required knowledge needed to install, configure, deploy and manage the solution effectively, but it can also have wide reaching opportunity gains throughout the business.

Once you find an Unified Endpoint Management (UEM) solution that can manage your mobile estate, secure and manage your endpoints and cloud services, can you just sit back and relax? The answer is probably no.  

Continue reading...
Posted by Louisa Mackintosh 17 July 2018

What's the biggest challenge you currently face in your mobility project?

  • How to increase productivity whilst remaining secure?
  • User resistance to acceptance of new devices, technologies and associated policies?

Continue reading...
Posted by Paul O'Sullivan 17 July 2018

You spend upwards of eight hours a day doing everything in your power to keep your system secure. So when an individual from within your own organisation is the cause of an information security breach, it can be exceptionally frustrating.

Continue reading...
Tags
Aruba
Posted by Louisa Mackintosh 5 July 2018

‘I’m increasingly convinced that people are spending their information security budgets in the wrong places’, said our Sales Director Paul O’Sullivan when I spoke with him earlier this week.

We sat down together to discuss the current state of the security marketplace and why it might be time for IT professionals to reconsider where they are spending their budget.

Continue reading...
Tags
Aruba
Posted by Louisa Mackintosh 2 July 2018

Bridgeway are delighted to announce that our customers and prospective customers can now purchase Cloud Software services from us, through the G-Cloud 10 framework that has come into effect today, Monday 2nd July.

Continue reading...
Posted by Louisa Mackintosh 21 June 2018

Network access control is no longer just for performing assessments on known devices before access. You can’t secure what you can’t see, meaning that security starts with visibility of all devices.

Designed to address this, the ClearPass Policy Manager is a comprehensive platform providing users with:

Continue reading...
Tags
Aruba
Posted by Louisa Mackintosh 14 June 2018

Consider the following: Joe, an engineer, logged into the source code repository at 10pm last night and downloaded 500MB of data. Meanwhile, the new head of the legal team, Sally, has been logging into the network from West London and Dublin—at the same time.


Pete, an analyst, is accessing a critical finance application that he has never used before, and Claire, one of your sysadmins, has been accessing the customer database after normal work hours every evening for the last two weeks.

Continue reading...
Tags
Aruba

 

 

Most Popular Articles