Category: Risk Management


ITB Welcomes Hoxhunt: : Enhancing Cybersecurity Through Innovative Human Risk Management

  At ITB, we\'re committed to staying ahead of the curve in the evolving world of cybersecurity. In our quest to provide the best solutions to our clients, we\'re excited to announce our new partnership with Hoxhunt, a leader in Human Risk Management and cybersecurity training. This colla ...Read More →

#cyber-education #cybersecurity #risk-management #uncategorised #vendors Read More

ITB Awarded Silver partner level with Rapid7

We are pleased to announce that we have been awarded \'Silver Status\' with our brand partner, Rapid7. This partnership brings advanced cyber security specialities to our customers and is a demonstration of how our team of technical experts have been recognised as advocates of Rapid7 solutions. ...Read More →

#general #risk-management #security-operations #vendors Read More

How Cyber Savvy Are Your Users?

The purpose of Cyber Security is to mitigate the abuse of, or indeed the destruction of your network, your applications, devices, data, or even physical assets. Standard practice taken by organisations is to deploy several types of security technologies across their networks including hardware, sof ...Read More →

#risk-management #services Read More

Back to Cybersecurity Basics – Part 8: Secure Configuration

For those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More →

#endpoint-security #general #risk-management Read More

Back to Cybersecurity Basics – Part 4: Information Risk Management

With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More →

#general #risk-management Read More

Back to Cybersecurity Basics – Part 2: User Awareness Training

According to datainsider.com, 91% of cyber attacks start with some sort of Phishing attempt. By now most of us are aware of the two main types of attack. A standard phishing attack will cast the net far and wide and be indiscriminate regarding who is targeted, whereas a spear phishing attack will ...Read More →

#general #risk-management Read More