Cyber security

Remote access and Zero Trust

For those of you who aren’t also following Jisc’s Cloud Blog, you may not have seen a post from Richard Jackson (Jisc’s Lead Cloud Security Specialist) on Remote access and Zero Trust. The post at delves into how organisations should handle remote access securely and contains useful advice that can help mitigate against some […]