At ITB, we\'re committed to staying ahead of the curve in the evolving world of cybersecurity. In our quest to provide the best solutions to our clients, we\'re excited to announce our new partnership with Hoxhunt, a leader in Human Risk Management and cybersecurity training. This colla ...Read More →
#cyber-education #cybersecurity #risk-management #uncategorised #vendors Read MoreWe are pleased to announce that we have been awarded \'Silver Status\' with our brand partner, Rapid7. This partnership brings advanced cyber security specialities to our customers and is a demonstration of how our team of technical experts have been recognised as advocates of Rapid7 solutions. ...Read More →
#general #risk-management #security-operations #vendors Read MoreThe purpose of Cyber Security is to mitigate the abuse of, or indeed the destruction of your network, your applications, devices, data, or even physical assets. Standard practice taken by organisations is to deploy several types of security technologies across their networks including hardware, sof ...Read More →
#risk-management #services Read MoreFor those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More →
#endpoint-security #general #risk-management Read MoreWith every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More →
#general #risk-management Read MoreAccording to datainsider.com, 91% of cyber attacks start with some sort of Phishing attempt. By now most of us are aware of the two main types of attack. A standard phishing attack will cast the net far and wide and be indiscriminate regarding who is targeted, whereas a spear phishing attack will ...Read More →
#general #risk-management Read More