The newly published Email Security Risk Report reveals that 99% of Cybersecurity leaders are stressed about email security. Plus 93% of organisations experiencing security incidents in the last 12 months. It is easy to see why. For housing associations, the risk email poses to sensitive data is pervasive. They operate a complex infrastructure environment, and need to ensure employees are appropriately … Read More
Patch Management Explained: Best Practices & Benefits
All You Need To Know About Patch Management And Why Automated Patch Management Will Simplify Your Sysadmin’s Life – by ANDRA ANDRIOAIE. What is Patch Management? Patch management if the process of distributing and applying updates to software. These patches are frequently required to fix bugs in the software known as vulnerabilities. It entails the acquisition, review and deployment of … Read More
Zero Trust & ZTNA
Zero-Trust is a security framework of products or services that removes inherent trust from your organisation. Instead it requires strong, regular authentication/authorisation of all devices and users, together with context & policy adherence. Zero-Trust Network Access (ZTNA) is a term coined by Gartner. It uses the concept of ‘Zero Trust’ in the control of access to the company’s resources at … Read More
Vulnerability Scanning
Why scanning more often could deliver surprising benefits you may not have considered. Can I just scan once per year, like with a penetration test? Penetration tests are uniquely effective in uncovering highly complex vulnerabilities in web applications: those which may require detailed human awareness and context in order to detect. However, whilst irreplaceable, penetration tests can also be relatively … Read More
Protect your Office 365 users & business against evasive phishing attacks.
One of the key challenges organisations are currently struggling with, or have seen, is an increase in Evasive Phishing. In addition, Impersonation Attacks and Business Email Compromise are also a problem. All of these are getting past traditional gateway and perimeter security solutions. The sophistication of these attacks makes them increasingly successful in avoiding detection and fooling your employees. This … Read More
Secure Your Cloud Infrastructure For Remote Workers
As working from home becomes more long-term, it’s important to secure your cloud infrastructure for remote workers. Cloud Infrastructure allows for great speed and ease of deployment. New infrastructure can be deployed in minutes. The rate of change in cloud infrastructure is far quicker than with on-premise and it is so easy and quick to deploy. This is enabling businesses … Read More
Top 10 Fraud Alert Tips for Black Friday & Cyber Monday
Black Friday attracts crowds, crowds attract scammers, and that means you need to take extra care when shopping online over the Black Friday and Cyber Monday weekend. Check out these Fraud Alert Tips to stay safe online throughout the festive season. Top 10 Fraud Alert Tips for Black Friday from KnowBe4. Never click on links in emails. If you want to … Read More
Vulnerability Management & Cloud Security
Cloud Security is becoming a top priority. Infrastructure as a Service (IaaS) is now the fastest growing area of the cloud. This is due to the speed, cost and reliability with which organisations can create and deploy applications, according to McAfee’s latest report –‘Cloud Native – Infrastructure as a Service Adoption & Risk Report’. Unfortunately, the results of their survey … Read More
World Password Day
Today is World Password Day which is a great occasion to be briefing our staff on the dangers of reusing passwords. The National Cyber Security Centre (NCSC) have reported on the most commonly used passwords found that have been accessed by third parties in global cyber breaches. Their breach analysis showed 23.2 million victim accounts worldwide used 123456 as a … Read More
40% of Organisations Not Doing Enough to Protect Office 365 Data.
Companies could be putting themselves at risk by relying exclusively on Office 365 Data Security, according to Barracuda. Barracuda’s latest report found that 40% of IT organisations surveyed don’t use third-party backup tools to protect Office 365 data. The report questioned more than 1,000 IT professionals, business executives, and backup administrators. They explain why it is a big risk to … Read More
- Page 1 of 2
- 1
- 2