Articles relating to IT Security

Andrew Mayo
Friday, 28 April 2017 / Published in Featured, Free Tools, Help Desk, IT Security
Open Sesame  When you log on to your computer, Windows converts the password you type into a hash, which, is just a very long number. For example, the MD5 hash of ‘Sarahandjack99’ as a decimal number starts with: 6426944284693920619…. I’ve chopped off some digits in this example to keep things simple. The actual number has
Simon Woods
Thursday, 20 April 2017 / Published in Featured, Help Desk, IT Security, Tachyon, Thursday Thoughts
So, let’s face it: every business goes through change.  They need to evolve to generate new opportunities and react to new threats, and as part of that process, in a general sense, information technology always has to facilitate some part of this change or deal with the effects of this change, even if it was
Andrew Mayo
Friday, 14 April 2017 / Published in Featured, Free Tools, Help Desk, IT Security
Understanding the Public Key Infrastructure Modern encryption, and by extension much of the web of trust that is built around it, is based on the Public Key Infrastructure, or PKI. Understanding PKI without maths Most explanations start off by mentioning that dreaded word, – “mathematics”. Let’s see if we can get an idea of how
When you look at the role of a “company” in today’s world, the responsibility a business has towards its employees and customers now contains something that didn’t exist 50 years ago: an IT estate. With the advancement of technology comes the woes for when the technology fails. Because every company today is deemed a “digital”
Mark Warren
Friday, 24 March 2017 / Published in 1E News, Featured, Help Desk, IT Security, Windows 10
 About this time last year (March 2016) Gartner published the results of their survey into Windows 10 migration plans in the business sector. Their key finding was that companies expected to be able to complete their migration in “only 23 months.” 23 months now looks like an age. Businesses need a much quicker deployment to maintain security
Pat Pruchnickyj
Wednesday, 15 March 2017 / Published in IT Security, Software Lifecycle Automation, Tachyon
WikiLeaks Tachyon revealed
By now you have probably all read the news about the cyber tools developed by the CIA and revealed in the WikiLeaks “Vault 7” revelations. Members of the public are naturally incensed at the fact that their TVs and smartphones can be used to eavesdrop on their conversations. What is less well known, but perhaps
1E unveils Tachyon: a new paradigm in IT
2017 promises to be a momentous year in 1E’s history. For one, it marks our 20th anniversary as a company. On a personal note, I couldn’t be prouder of what we’ve achieved in that time. It’s been a lot of work, and a lot of fun. Best of all, we enter our anniversary year safe
Keith Garner
Friday, 09 December 2016 / Published in IT Security, OS Deployment, Uncategorized, Windows 10
  As regular readers will know, we are very proud round these parts of the four – count ’em –  distinguished Microsoft MVPs we have in-house. So, as 2016 comes to an end, we have asked them to offer us their New Year reflections. First of all, we’ve got Keith Garner, Solutions Architect, 1E &
Andrew Levey
Monday, 25 July 2016 / Published in Free Tools, IT Security, Uncategorized
security
With cyber security breaches hitting the headlines on a frequent basis these days, it’s hardly surprising that security and privacy ranked 2nd in the top 10 IT management issues for 2016 in the most recent Society for Information Management (SIM) annual survey. While there’s no doubt that cyber hackers are getting more innovative in their
It’s really hard to put numbers on the benefits of many products or services. For example, could you justify upgrading from an old banger to a new Jaguar based on having a better infotainment system?  (Making such a decision is definitely tricky – if anyone can help me make my case to my financial advisor,