Cyber Security

Cyber Security
8 Steps To Secure Your Network - Culture

8 Steps To Secure Your Network

Do you ignore your network or infrastructure? An unprotected network is akin to having a road network with no speed cameras, no CCTV, no traffic lights and no pedestrian crossings. It might be nice for a short while but pretty soon chaos will reign. Cybersecurity is most effective when there is a synergy between policies, procedures and technology working in sync […]

Cyber Security GDPR
Be more GDPR compliant– tune up your Next Generation Firewall? - Business

Be more GDPR compliant– tune up your Next Generation Firewall?

Does effective cyber security protection and GDPR compliance mean that existing solutions will need replacing? That depends on what you have deployed and how you have configured it. The changing nature of the cyber security threat does call for an agile and adaptable protection approach that will increasingly make use of automation and machine learning. In addition, the requires of GDPR […]

Cyber Security
Technology To Combat Cloud Security (2018) - Cloud

Technology To Combat Cloud Security (2018)

As the cloud becomes the backbone of the digitisation era we review what this means in terms of securing this emerging complex puzzle of users, data and applications. The interconnected world where access to business IT is expected anytime from anywhere poses different challenges than those previously faced by business leaders and technical teams. While […]

Cyber Security
5 Key Cyber Security Elements For Your Business - Communication

5 Key Cyber Security Elements For Your Business

Digitisation has meant the wholesale adoption of cloud services. We are going to cover 5 key cyber security elements to help your business navigate the changing IT landscape. These elements are; Automation Lifecycle Approach Integrated Systems Layered Architecture Insight and Analytics Digitisation is solving problems, creating opportunities and rewriting the way in which your business […]

Cyber Security
5 Basics of Cloud Security - King James Version

5 Basics of Cloud Security

The basic objective of a cloud security strategy is to provide a method to monitor and protect the flow of information to and from cloud hosted services. There has been and will continue to be a shift towards public and private cloud services as the age of digitisation is increasingly being embraced by organisations.    According […]

Cyber Security
Penetration Test: the new cyber test in town - /m/02j71

Penetration Test: the new cyber test in town

When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]

Cyber Security
Cyber Risk Assessment– get good at it - Collaboration

Cyber Risk Assessment– get good at it

Today’s reliance on IT technology is unparalleled and will only increase. While some businesses are pondering the benefits of IoT deployment or bespoke business applications, others are ploughing ahead and pioneering their initiatives. Some of these initiatives are stuttering and some are big winners that have transformed their business. Digitisation and it’s attendant benefits is the new game in town […]