No Switching Required: Access Manager Makes Linux Managers Happy

Jack Ma, founder of Alibaba Group, China’s largest e-commerce business, once remarked “I’m not a tech guy. I’m looking at the technology with the eyes of my customers, normal people’s eyes.” At Nervepoint Technologies, we are tech people. And we constantly look at technology through the eyes of our customers, many of whom are techies.
Continue Reading »

Keeping it Simple in IT: Attributes of a Good Identification Management Platform

Why make things easy when it’s so easy to make things hard? This question always enters my head when I think of Identity Management. In two decades of covering the Identify Management industry I have seen one company after another build identity management solutions that either over complicate the experience for the network administrator or
Continue Reading »

What are the lessons learnt from password hacking?

Hot off the heals, with the recent hacks on eBay and Gmail, it’s not surprising that we find 2 more respected organisations who’s security has been compromised and leaves data vulnerable to hackers. iThemes iThemes, a favoured website that provides themes and plugins for popular blog site WordPress, have contacted all their users with a notice
Continue Reading »

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell
Continue Reading »

Has the 5 million Gmail password hack affected you?

On Wednesday, many technology websites and blogs broke the news that hackers leaked around 5 million stolen Gmail account details to a Russian Bitcoin forum. This follows similar leaks of account data from popular Russian web services, so is there room to be concerned? Understandably, this has caused huge outrage and worry amongst users of
Continue Reading »

Why does my company need self-service password reset?

Wikipedia has defined self-service password reset as “any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk”. Simply put, self-service password reset allows you to manage your password through answering pre-set
Continue Reading »

The Impact of BYOD on Data Security in Schools

Schools are now more than ever before in possession of a huge amount of personal and sensitive data about both staff and students. This can include data such as exam results or private medical information. Therefore, the importance of securing this data within school IT systems goes without saying; it becomes increasingly critical because many
Continue Reading »

The Importance of Password Management for SME’s

In a business environment that is dynamic, constantly evolving and ladled with threats, it is important to ensure all data is kept secure through using some form of password management. Recent, market research has stated that over the next 4-5 years, this requirement for password management is only set to increase because the need to
Continue Reading »

Security and Staff – What’s the Connection?

In a business environment where security is paramount, online security is so very important. In generations before now, the only real worry about online security was virus infections, however now we’re having to face a plethora of issues including phishing, identity theft, spyware and the list goes on. Additionally, we have to think about internal
Continue Reading »

Considerations for cloud in education

In recent years migrating to the cloud has become a common action for many educational establishments. When looking to migrate partial or entire on-premise services, it is important to ensure the transition is smooth, however this is not always the case. This often results in an increased load on the help desk and IT department.
Continue Reading »