Category: Technologies


The Backup Plan

As we look towards 2023, and we start to think about how best to plan our new cyber strategies for the New Year, it is always great to start looking at trends in the market. Understanding the cybersecurity industry and the many, many trends isn\'t always straightforward, as cyber criminals are ever ...Read More →

#data-security #general Read More

How Cyber Savvy Are Your Users?

The purpose of Cyber Security is to mitigate the abuse of, or indeed the destruction of your network, your applications, devices, data, or even physical assets. Standard practice taken by organisations is to deploy several types of security technologies across their networks including hardware, sof ...Read More →

#risk-management #services Read More

IT Security - Email & Web Security

Email Security Email is one of your most business-critical tools, however, the range of email threats is increasing rapidly. Due to this, systems and solutions for email and web security are having to adapt and become more complex than ever, while at the same time offer advanced business functional ...Read More →

#technologies Read More

Back to Cybersecurity Basics – Part 10: Network Security

Gone are the days when a network was confined within the walls of your business. In 2018 organisations of all sizes are taking advantage of the rapid advances in technology to provide their employees with a more distributed, flexible working environment. This flexibility brings with it numerous b ...Read More →

#network-security #general Read More

Back to Cybersecurity Basics – Part 9: Malware Protection

Malware, or malicious software to give it it’s full name is any software that’s sole intention is to cause harm to a computer/network or to use its influence to extract sensitive data or money in the form of cryptocurrency. To protect yourself from Malware, you must first understand what Malw ...Read More →

#endpoint-security #general Read More

Back to Cybersecurity Basics – Part 8: Secure Configuration

For those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More →

#endpoint-security #general #risk-management Read More

Back to Cybersecurity Basics – Part 7: Security Monitoring

Cyber attacks come in all shapes and sizes. From internal threat actors to state-sponsored attacks on government, security is now seen as one of the biggest threats to business. In fact, in the recently released World Economic Global Risks Report, cyber attacks were in the top 5 risks to global stab ...Read More →

#general #security-operations Read More

Back to Cybersecurity Basics – Part 6: Removable Media Controls

One of the most difficult things to manage from an IT Security perspective is the actions of your users. Even the most trustworthy employees can fall prey to a phishing scam or leave their laptop on a train and then we have those employees who aren’t so trustworthy who may try to maliciously sabot ...Read More →

#data-security #general Read More

Back to Cybersecurity Basics – Part 5: Managing User Privileges

IT and Cyber Security means many different things to many different people. One size definitely doesn’t fit all, and different companies have their own individual challenges to resolve. The larger a company gets the more complex it’s security requirements become. Despite some anomalies, one c ...Read More →

#access-management #general Read More

Back to Cybersecurity Basics – Part 4: Information Risk Management

With every decision we make, be that at work or at home, we are constantly, be that consciously or subconsciously, undertaking a risk analysis. I have a 3-year-old son who has a slight cold. Yesterday he wanted to go to the park and I had to subconsciously undertake a risk assessment based on whe ...Read More →

#general #risk-management Read More