Entries by digitalpathway

Are You Protecting Your Documents With A Digital Signature?

Protecting digital documents and being able to verify that the sender of a file is, in fact, who they say they are, is fast becoming a major concern for many businesses. Whether receiving a document from a business partner or downloading software from the Internet, the ability to verify the integrity of a file is […]

Why Use A Digital Signature?

Whether receiving a document from a business partner, or downloading software from the internet, the ability to verify the integrity of a file is crucial. Documents that have been tampered with or created fraudulently pose a serious threat to any business. A digital signature is a mathematical scheme for demonstrating the authenticity of a digital […]

So what happened in February?

At Digital Pathways, we understand a thing or two about cyber security and the risks surrounding data breaches. As you would expect, we strive to keep on top of major events where a firm or individual falls foul of cyber criminals. With the details understood, we can then impart our knowledge and advise people on […]

How log management can protect your systems

Every PC and server you use will keep an audit of its activity, which gives you valuable insight into the behaviours of its users. Log management is an essential tool in the battle against cyber-crime. It might not be as glamorous as anti-malware software, or the use of honeypots, but it can be the single […]

Encryption As The Cornerstone Of Big Data Security

Big data programmes benefit organisations in many ways, driving competitiveness and innovation. But they can also increase security risks. One of the most important issues for organisations running big data projects is balancing the need to protect data from misuse, fraud or loss, while ensuring the ability to perform big data analysis is preserved. Big […]

The Annual Networking Computing Awards 2017

The annual Network Computing Awards were held on the 30th March at the De Vere Grand Connaught rooms in London, with former England Cricket Captain, Chris Cowdrey as MC for the evening. The cream of the IT industry was in attendance eagerly awaiting the results of the runners up and ultimate winners for each category.

The eSignature Comes of Age

In recent years, the use of digital or electronic signatures has rapidly increased in an effort to streamline all types of business transactions. The eSignature can not only be used as an actual certifiable signature, just as we did with a pen, but can also be used to encrypt the contents of a document, thus […]

Encryption as the Cornerstone of Big Data Security

Big data refers to huge data sets that come about through the phenomenal growth being seen in the volume of information collected, produced, analysed, shared and stored by organisations. By analysing big data sets, valuable insights can be gained into how patterns of data are associated to enable better-informed decision-making, which can aid in competitiveness […]

Dealing With The Mobile Nature of Data Sharing in the Legal Sector

The way that we digitally share information has changed dramatically in recent years, thanks to the rapid evolution of cloud storage and increasing intelligence of smart phone technology. What each of these innovations has allowed is more mobility with our data, giving individuals access to vital files and documents from multiple devices almost anywhere in […]