Peter Purton

Peter Purton is a London-based writer and editor, specializing in explaining the impact on business of innovations in information and communication technologies.

Getting Your Team To Practice Safe Technology

How can IT managers encourage everyone to be proactive about security vs just following orders? Peter Purton gives some practical tips in this article.

9 (Friendly) Ways To Make People Security Conscious

Creating a security-minded organizations is as much about finessing people involved as it is about the latest and great firewalls.

Does Your Company Have A Security-Unconscious Culture?

Security is only as good as an organization’s weakest link and that link is often human vs machine. Recognizing the problem is the first step in fixing it.

7 Reasons Digital Security Means Physical Security

In an era of continual digital hacking, don’t overlook physical security as a means to protect your digital assets and information.

8 Tips To Navigate Enterprise Security Threats In 2017

Navigating the tough security waters in 2017 can be extremely challenging. Here are some practical tips to safe safe and secure.

What’s Next For Enterprise Security In 2017?

As we head into 2017, what do experts predict will take place when it comes to enterprise security and data breaches?

Security Lessons Learned (The Hard Way) From 2016

2016 saw countless hacks across the world. Companies, large and small, faced consistent threats from hackers. Will 2017 be any different?

How To Keep Your Organization Hack-Free

In the face of increasing phishing and malware problems in the enterprise, what steps can CIOs and other IT officials take to safeguard their networks?

How To Keep Your Company Safe From Phishing Attacks

Phishing attacks against the enterprise are on the rise. What steps can organizations take to prevent users from being tricked?

11 Ways Schools Can Protect Themselves From Cyber Attacks

With schools moving into the cross hairs of cyber criminals and hackers, how can they strengthen their defenses to protect key infrastructure?