HTTP Strict Transport Security

For reasons of convenience most secure websites are accessible through both HTTP and HTTPS. On request, the HTTP site simply redirects the user to the HTTPS site. This method, however convenient, does pose a considerable security risk. Indeed hackers can easily perform a ‘man in the middle attack’ based on the HTTP request.

Continue reading

Reversing the vicious cycle of bad IT results

Last week my colleague Yanne Veronneau wrote a piece on this blog about avoiding the vicious cycle of bad IT results (I strongly suggest you read it – and also check out the original article by Bob Lewis from IT Catalysts that inspired it. Good stuff).

Anyway, it’s been a bit of a hot topic around the office since then. And it got me thinking about the people that aren’t so lucky that they can avoid that awful situation to begin with… Some people believe that the relationship between Business and IT is doomed to be a bad one, but please believe me, it doesn’t have to be that way!

Continue reading

Avoiding the vicious cycle of bad IT results

I recently came across a brilliant piece by Bob Lewis from IT Catalysts about breaking the vicious cycle of bad IT results.

I’m going to try and sum it up here and give our take on it, but I really urge you to go ahead and read it right here.

Continue reading