Blog
Back to Cybersecurity Basics – Part 8: Secure Configuration
For those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More >>
#endpoint-security #general #risk-managementBack to Cybersecurity Basics – Part 7: Security Monitoring
Cyber attacks come in all shapes and sizes. From internal threat actors to state-sponsored attacks on government, security is now seen as one of the biggest threats to business. In fact, in the recently released World Economic Global Risks Report, cyber attacks were in the top 5 risks to global stab ...Read More >>
#general #security-operationsBack to Cybersecurity Basics – Part 6: Removable Media Controls
One of the most difficult things to manage from an IT Security perspective is the actions of your users. Even the most trustworthy employees can fall prey to a phishing scam or leave their laptop on a train and then we have those employees who aren’t so trustworthy who may try to maliciously sabot ...Read More >>
#data-security #generalBack to Cybersecurity Basics – Part 5: Managing User Privileges
IT and Cyber Security means many different things to many different people. One size definitely doesn’t fit all, and different companies have their own individual challenges to resolve. The larger a company gets the more complex it’s security requirements become. Despite some anomalies, one c ...Read More >>
#access-management #generalBack to Cybersecurity Basics – Part 4: Information Risk Management
With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More >>
#general #risk-management