Cyber Security
3 Cyber Attacks Affecting Small-Medium Businesses [2018] - Business

3 Cyber Attacks Affecting Small-Medium Businesses [2018]

According to a recent benchmark survey, more than 50% of all cyber attacks result in financial damages of more than $500,000 Which could include lost revenue, lost customers, lost opportunities, and out-of-pocket expenses. This level of damage is enough to put many small and medium-sized businesses out of operation permanently.     Cyber attackers are increasingly focusing their attention on SMB businesses as they see them as a soft target with less sophisticated cybersecurity protection and a lack of in-house skills to defend from […]

Cyber Security
8 Steps To Secure Your Network - Culture

8 Steps To Secure Your Network

Do you ignore your network or infrastructure? An unprotected network is akin to having a road network with no speed cameras, no CCTV, no traffic lights and no pedestrian crossings. It might be nice for a short while but pretty soon chaos will reign. Cybersecurity is most effective when there is a synergy between policies, procedures and technology working in sync […]

Cyber Security GDPR
Be more GDPR compliant– tune up your Next Generation Firewall? - Business

Be more GDPR compliant– tune up your Next Generation Firewall?

Does effective cyber security protection and GDPR compliance mean that existing solutions will need replacing? That depends on what you have deployed and how you have configured it. The changing nature of the cyber security threat does call for an agile and adaptable protection approach that will increasingly make use of automation and machine learning. In addition, the requires of GDPR […]

Cyber Security
Technology To Combat Cloud Security (2018) - Cloud

Technology To Combat Cloud Security (2018)

As the cloud becomes the backbone of the digitisation era we review what this means in terms of securing this emerging complex puzzle of users, data and applications. The interconnected world where access to business IT is expected anytime from anywhere poses different challenges than those previously faced by business leaders and technical teams. While […]

Cyber Security
5 Key Cyber Security Elements For Your Business - Communication

5 Key Cyber Security Elements For Your Business

Digitisation has meant the wholesale adoption of cloud services. We are going to cover 5 key cyber security elements to help your business navigate the changing IT landscape. These elements are; Automation Lifecycle Approach Integrated Systems Layered Architecture Insight and Analytics Digitisation is solving problems, creating opportunities and rewriting the way in which your business […]

Cloud Security
A Summary of Digitisation and Cloud Adoption - Image

A Summary of Digitisation and Cloud Adoption

The age of digitisation is a driving force spinning a web throughout business planning and strategy. Digitisation is transforming business norms, creating new and dominant players faster than any other time in history. Digitisation is such a powerful force because it is creating new ways of engagement between business, customers and stakeholders. This has resulted in more and more […]

Cloud Security
Infographic: Secure remote working with DNS - Graphic design

Infographic: Secure remote working with DNS

Download the Infographic The best way to counter rogue activity is with DNS-layer security that’s always-on … just like your end-users. What can you do to mitigate the risks associated with “off-network” access to sensitive data and applications? According to a recent IDG Research Services report, roaming workstyles are the new norm. Workers are dispersed, […]

Cyber Security
5 Basics of Cloud Security - King James Version

5 Basics of Cloud Security

The basic objective of a cloud security strategy is to provide a method to monitor and protect the flow of information to and from cloud hosted services. There has been and will continue to be a shift towards public and private cloud services as the age of digitisation is increasingly being embraced by organisations.    According […]

Cyber Security
Penetration Test: the new cyber test in town - /m/02j71

Penetration Test: the new cyber test in town

When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]