Information Security

What are Public/Private Keys?

What Are Public/Private Keys? Download ‘What Are Public/Private Keys?’ as a PDF Public/private key pairs are used for public-key cryptography, also known as asymmetric cryptography. In comparison to its less modern counterpart – symmetric cryptography – asymmetric cryptography uses two distinct keys for encryption and decryption. Asymmetric cryptography is the […]

Read More


Ransomware  Ransomware is a growing concern for many large business. We’ve all seen news stories where large business have been frozen out of their data because someone’s holding it hostage.  Download ‘Ransomware’ as a PDF What is it? Although there are different strains of ransomware they all work on the […]

Read More

The battle of the e-signatures

The battle of the e-signatures The future of documentation is electronic signatures. During the last year, many companies have moved their wet ink signature processes to digital. This has created a huge market for electronic signature software, but which is best? This article takes three leading signature software products and […]

Read More