The Basics
October is European Cyber Security Month
With October being the 10th Annual European Cyber Security Month, we thought it would be a good idea to summarise some key principles and recent cyber security industry updates. We will also cover some events and activities over the month you can participate in as part of an international programme of cyber security related content…
Read MorePassword protection pitfalls and how to avoid them.
What’s in a name? We are frequently reminded and prompted every time we make a new password to ensure it is ‘strong’ and not easily guessable or hackable by bad actors and hackers. Despite these warnings many people still use repeated passwords or combinations of names of loved ones and birthdays or other significant dates…
Read MoreHow to build brand trust online
Brand theft and ‘form jacking’ In our recent articles we have been discussing the scope of online threats and the ways you can protect and mitigate against cyber-attacks. Be they through your email, connected networks or digital assets, these threats exists and one issue this has created that we haven’t yet touched upon is an…
Read MoreCyber hygiene – prevention is better than cure
What is cyber hygiene Cyber hygiene is an ordered routine of specific tools, checks and practices which safeguard the handling of essential data, and secure networks and ‘attack surfaces’ (the areas in your network that are vulnerable to attack). Cyber hygiene practices are specific to the needs of the organisation and of specific individuals or…
Read MoreWhy does your organisation need a cyber security policy?
In our last post we discussed the impact of our working from home (WFH) and hybrid remote working styles on organisational security. The context for this is a rapidly expanding cybersecurity sector and a critical level of cyber-attacks from hackers in response to new technologies and software that seek to prevent them. In turn there…
Read More3 of the Most Common Business Email Compromise Attacks in 2021
What are the most common business email compromise attacks and what strategies or tactics can you use to mitigate against them? Learn about it here.
Read MoreNew Industries Should Get Ready to Comply with the Revised Directive on Security of Network and Information Systems (NIS2)
New industries will need to comply with the revised NIS2 directive. How will these proposed changes effect your company?
Read MoreWhat Is An Insider Threat and How Do You Deal With It?
34% of data breaches in the 2019 Verizon Data Breach Report involve internal actors. Read our post to learn how to prevent insider threats.
Read MoreWhy Should You Digitally Sign Emails?
Protect your organisation from the increased phishing attacks targeting organisation employees with these direct examples and tips for employers.
Read MoreTop 4 Requirements for Email Security
Email security has 4 tenants. Learn about message integrity, authenticity, confidentiality and non-repudiation in this article.
Read More