Month: January 2018


Back to Cybersecurity Basics – Part 6: Removable Media Controls

One of the most difficult things to manage from an IT Security perspective is the actions of your users. Even the most trustworthy employees can fall prey to a phishing scam or leave their laptop on a train and then we have those employees who aren’t so trustworthy who may try to maliciously sabot ...Read More →

#data-security #general Read More

Back to Cybersecurity Basics – Part 5: Managing User Privileges

IT and Cyber Security means many different things to many different people. One size definitely doesn’t fit all, and different companies have their own individual challenges to resolve. The larger a company gets the more complex it’s security requirements become. Despite some anomalies, one c ...Read More →

#access-management #general Read More

Back to Cybersecurity Basics – Part 4: Information Risk Management

With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More →

#general #risk-management Read More

Back to Cybersecurity Basics – Part 3: Incident Response

‘It’s no longer a case of if but when’. Of course, those of us who have been working in the IT Security industry for longer than we care to remember know that we’re talking about becoming the victim of a cyber-attack. For many of the larger organisations around the world this is nothin ...Read More →

#general #security-operations Read More