Data Breach
The GDPR regulation is ultimately about good data/information management and governance. Though many organisations acknowledged previous iterations of data protection regulation, GDPR demands that everyone step up their game and take responsibility or face severe consequences. The innovative use of technology aligned with the data handling processes and procedures will go a long way to […]
Why is GDPR necessary? Regulations such as GDPR have come about as a consequence of technology. The increasing storage of private data over decades has led to concerns over individual privacy. Technology has meant that there is a risk that privacy could be trampled on or sensitive user data accessed inappropriately. Worst still data could […]
What will you pay? With a 750% increase in ransomware attacks in 2016, a first layer of defense is needed. View the infographic for new proactive strategies with Cisco Umbrella and keep your business protected. Click here to view the infographic
We introduce another acronym yesterday, CASB (Cloud Access Security Broker) and we now expand on the features and benefits of deploying a CASB solution as we continue in our approach to cloud security. We noted in our previous blog that cloud security was a shared responsibility between service user and service provider. Gartner analysis indicates […]
Download: A View of the Cybercrime Threat Landscape $2,235,018 per year The average amount SMBs spent in the aftermath of a cyber attack or data breach due to damage or theft of IT assets and disruption to normal operations. The amount is staggering, and enough to jeopardize the viability of many companies. Yet the business […]
We have discussed the changing IT landscape as the age of digitisation gains traction and growth in connectivity continue apace. The cyber attack surface is increasing and so is the scale and sophistication of attacks as identified by Cisco in it’s latest annual cyber security report. Security breaches will continue to happen because there is […]
GDPR requires organisations to have a plan along with the necessary process and controls to detect a data breach, regularly evaluate the effectiveness of security practices, and document evidence of compliance. This checklist is an easy way of seeing how prepared you are to meet these new requirements Download: GDPR Self assessment
So now we have confirmed what we already knew, the era of digitisation is bringing unimaginable opportunities for business innovation and differentiation. The big BUT is that our traditional approach to securing IT assets needs to be transformed and be relevant for the emerging world of large scale remote working, cloud based applications and massive […]
Ransomware has grown to become the most popular cyber attack method on the Internet today. Growing at a rate that will see it become a $1 trillion dollar industry within a few years. It is imperative that every business develop and execute a comprehensive ransomware defense strategy to ensure the survival of their business. An […]
- 1
- 2