Blog
Back to Cybersecurity Basics – Part 5: Managing User Privileges
IT and Cyber Security means many different things to many different people. One size definitely doesn’t fit all, and different companies have their own individual challenges to resolve. The larger a company gets the more complex it’s security requirements become. Despite some anomalies, one c ...Read More >>
#access-management #generalBack to Cybersecurity Basics – Part 4: Information Risk Management
With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More >>
#general #risk-managementBack to Cybersecurity Basics – Part 3: Incident Response
‘It’s no longer a case of if but when’. Of course, those of us who have been working in the IT Security industry for longer than we care to remember know that we’re talking about becoming the victim of a cyber-attack. For many of the larger organisations around the world this is nothin ...Read More >>
#general #security-operationsBack to Cybersecurity Basics – Part 2: User Awareness Training
According to datainsider.com, 91% of cyber attacks start with some sort of Phishing attempt. By now most of us are aware of the two main types of attack. A standard phishing attack will cast the net far and wide and be indiscriminate regarding who is targeted, whereas a spear phishing attack will ...Read More >>
#general #risk-managementBack to Cybersecurity Basics – Part 1: Mobile and Home Working
‘Complexity is the enemy of IT Security’, it’s a phrase we hear time and again in this industry and rightly so. With each new way a hacker tries to target an organisation, there seems to be a new product that springs up to protect the network. Now whilst these are very much required, we somet ...Read More >>
#endpoint-security #general