Saving money with SD-WAN (part two)
“SD-WAN is an exciting, transformative technology that can do a lot of amazing things for your business – but it needs to be used correctly.”
In my last blog, I attempted to cut through some of the hype surrounding SD-WAN. I did this by looking at the too-often-believed myth that SD-WAN can save companies money by effectively replacing private networks with commodity internet and ‘magic’ boxes. I thought it was important to sound a cautious note in the midst of a lot of hyperbolic claims about SD-WAN’s magical properties.
Continue reading “Forget the hype: here’s 3 ways you can actually save money with SD-WAN”
By 2019, 1 to 2 million roles within cyber security will be unfulfilled. That’s a figure that should strike fear into the heart of even the most stoic of business people. The threat of cyberattacks is growing quickly, and there aren’t enough skilled people in place to control the wildfire.
This global cyber security skills crisis isn’t exactly a new problem, though. Over the last 2 years, 40% of cyber security roles remained unfulfilled, despite an increase in job postings of over 74%. This is a problem, then, that’s been smouldering in the background for a long time, and consequently now has the potential to create some serious destruction.
Continue reading “Cyber security expertise and the global skills gap”
Cyber security is more complex now than ever before, and the implications of a cyber-attack can be much more disastrous. Organisations must consider not only the financial implications but the reputational damage that can arise following an attack. The proliferation of social platforms and the increasing needs of regulation, mean that security breaches can be publicised across the globe within minutes. Whilst the cost of launching a cyber-attack has reduced over the last few years, the cost of defence has risen. This is because there’s a greater variety of attack vectors – means by which an attacker can gain access to your network. The methods deployed are so vast, compared to previously, that it makes it increasingly difficult to build an effective defence against. Highly sophisticated cyber-attacks are also using automation techniques to maximise their damage, to the extent where one piece of code can be used many thousands of times.
Continue reading “The changing faces of security”