Posts by Pie Security
What will hybrid remote work styles mean for organisational security?
Working from home (WFH) and remote working are terms we have become extremely familiar with over the last few years. As many businesses were forced into a remote, work from home setup overnight, there has been a deficit of contact and flexibility that hybrid working has the potential to address now we can return to…
Read MoreWhy Email Encryption Projects Fail and How to Make Sure Yours Doesn’t
All too often we meet companies who tell us how their last email encryption solution didn’t work for them. They found themselves with a provider that did not deliver or perhaps they anticipated so much more then what was actually delivered. If a solution to a problem creates more problems than it solves – you…
Read More3 of the Most Common Business Email Compromise Attacks in 2021
What are the most common business email compromise attacks and what strategies or tactics can you use to mitigate against them? Learn about it here.
Read MoreNew Industries Should Get Ready to Comply with the Revised Directive on Security of Network and Information Systems (NIS2)
New industries will need to comply with the revised NIS2 directive. How will these proposed changes effect your company?
Read MoreWhat Is An Insider Threat and How Do You Deal With It?
34% of data breaches in the 2019 Verizon Data Breach Report involve internal actors. Read our post to learn how to prevent insider threats.
Read MoreHow Secure Is Gmail and Outlook For Business?
Is your organisation also considering a digital transformation? Learn how email encryption and signing makes digital transformation possible.
Read MoreHow Email Encryption and Signing Enhance Digital Transformation
Is your organisation also considering a digital transformation? Learn how email encryption and signing makes digital transformation possible.
Read MoreTop 9 Data Protection Tips in the Era of Remote Working
What is your organisation’s data protection strategy for remote workers? Why not read our top tips to see if you miss anything.
Read MoreWhy Should You Digitally Sign Emails?
Protect your organisation from the increased phishing attacks targeting organisation employees with these direct examples and tips for employers.
Read MoreHow to Protect Work Emails During Coronavirus Pandemic
A comprehensive guide to protecting your organisation’s work emails during the coronavirus pandemic. With many employees working from home, your IT environment has increased in complexity, are you ready to cope?
Read MoreAvoid Employees Falling For These Coronavirus Phishing Scams
Protect your organisation from the increased phishing attacks targeting organisation employees with these direct examples and tips for employers.
Read MoreWhy You Need Email Encryption?
It may come as a shock to learn that as a standard: emails are not encrypted. Learn more about the basics of email encryption to help you stay compliant with data protection regulations such as GDPR.
Read MoreWhat is a Data Leak and How Can It Affect Educational Institutions?
As is often the case with any kind of leak, a hole must be found and plugged before it is too late. In the education sector, this is no different. A data leak can be your worst nightmare so here’s a summary of what it is and how you can protect yourself from it.
Read More4 Ways Educational Institutions Can Encrypt Emails
This guide aims to explain the four main encryption methods for email and explain the drawbacks and challenges with each approach so that you can make the decision that’s right for you.
Read MoreTop 4 Requirements for Email Security
Email security has 4 tenants. Learn about message integrity, authenticity, confidentiality and non-repudiation in this article.
Read More