Email security should be the top priority as it is still the number one initial attack vector for data breaches, according to IBM. Despite this, sophisticated email attacks continue to effectively take their victims, exploiting…
Post published:19 June 2022
Taking a look at cyber security insurance requirements and why insurers are now asking for MFA We are currently seeing a trend in the marketplace for insurance providers to require multi-factor authentication (MFA)…
Post published:16 June 2022
Salesforce is a popular choice for businesses to better manage customer relationships, sales, customer service, marketing analysis, etc. As your Salesforce environment lives and grows, you will need to protect all it contains…
Post published:13 June 2022
When considering cybersecurity strategies for data protection, guarding against external threats is usually the first on the list. However, headline-grabbing cyberattacks account for only half of the root causes of data breaches, according to…
Post published:9 June 2022
File transfer has been around since the beginning of time. Ok, may be that’s a bit of an exaggeration, but you get the point. The year is 1971. Abhay Bhushan, perhaps tired of…
Post published:9 May 2022
Post Russia unleashing its attack on Ukraine, there’s a high chance that if you’re working in the cybersecurity sector like me, you’re being asked a series of questions like: Do you think Russia…
Post published:8 May 2022
The summer of 2020 saw Microsoft roll out Azure AD Premium 1 features to all Microsoft 365 Business Premium accounts. This meant the one-stop shop for the majority had landed when it came…
Post published:24 April 2022
Data protection has become an essential part of all business strategies, no matter the company’s size. In many countries, it has become a legal obligation. Data protection legislation such as the EU General Data…
Post published:20 April 2022
In today’s increasingly digital world, the ways a business approaches its cloud computing strategy is paramount. Cloud adoption was already expanding for several years and has been accelerated by the pandemic. But as a…
Post published:16 February 2022
More secure than a firewall, more reliable than a data diode The Cybersecurity and Infrastructure Security Agency (CISA) recently released guidance focused on securing Industrial Control Systems (ICS) to help protect U.S. critical…