Business Tips
#LAYERUP for World Password Day this May
May 4th is already a popular date for fans of a certain sci fi franchise, but hopefully the date doesn’t just pass you by without you noticing it’s also World Password Day! Once you have stopped celebrating this momentous occasion and the cake is all gone, perhaps don’t groan too much at the idea of…
Read MorePhishing Scams 101
Phishing scams have become a pervasive threat to businesses of all sizes and industries. These attacks involve the use of deceptive emails, texts, and phone calls to trick individuals into divulging sensitive information or clicking on a link that infects their device with malware. The consequences of a successful phishing attack can be devastating for…
Read MoreTop mobile security threats and how to protect against them
Our mobile phones are rarely more than an arm’s reach away, they are our fastest gateway to the digital world, and this is not something that has gone unnoticed by hackers. Here we will look at the top mobile security threats and how you can protect against them. According to the ONS report for…
Read MoreHow is Artificial Intelligence changing cybersecurity?
Today we will look at how AI is changing cybersecurity and what it means for business. As touched on in our last article, Cybersecurity challenges and trends for 2023, the new year brought with it further acceleration and adoption of artificial intelligence led security systems, anti-virus software and in contrast, automated machine learning hacking tools.…
Read MoreCybersecurity challenges and trends for 2023
A new year is a good time to take stock, the same goes for gaining an understanding of the changes and updates in the world of cybersecurity. While this may not always feel like a pressing topic, in business, the best thing we can do is be prepared to meet challenges that we are likely…
Read MoreOctober is European Cyber Security Month
With October being the 10th Annual European Cyber Security Month, we thought it would be a good idea to summarise some key principles and recent cyber security industry updates. We will also cover some events and activities over the month you can participate in as part of an international programme of cyber security related content…
Read MoreWhat will Web3 mean for cybersecurity?
What is Web3 and why is it happening? At 33 years old, the internet has become both omnipresent in the lives of a vast number of people globally, and omniscient in the way it collects data on us, knows our preferences, our habits, our routines, location, personal information, and the things we like to watch…
Read MoreTop cyber security trends of 2022 – an SRM leaders guide
Security and risk management (SRM) leaders will be more than familiar with the feeling of playing ‘whack-a mole’ with emerging cyber security threats. However, post-pandemic 2022 has been no ordinary year. The evolution of the cyber security role is evident, and the board and public’s perception of risk are beginning to align which has…
Read MoreHow to build brand trust online
Brand theft and ‘form jacking’ In our recent articles we have been discussing the scope of online threats and the ways you can protect and mitigate against cyber-attacks. Be they through your email, connected networks or digital assets, these threats exists and one issue this has created that we haven’t yet touched upon is an…
Read MoreCyber hygiene – prevention is better than cure
What is cyber hygiene Cyber hygiene is an ordered routine of specific tools, checks and practices which safeguard the handling of essential data, and secure networks and ‘attack surfaces’ (the areas in your network that are vulnerable to attack). Cyber hygiene practices are specific to the needs of the organisation and of specific individuals or…
Read MoreWhy does your organisation need a cyber security policy?
In our last post we discussed the impact of our working from home (WFH) and hybrid remote working styles on organisational security. The context for this is a rapidly expanding cybersecurity sector and a critical level of cyber-attacks from hackers in response to new technologies and software that seek to prevent them. In turn there…
Read MoreWhat will hybrid remote work styles mean for organisational security?
Working from home (WFH) and remote working are terms we have become extremely familiar with over the last few years. As many businesses were forced into a remote, work from home setup overnight, there has been a deficit of contact and flexibility that hybrid working has the potential to address now we can return to…
Read MoreWhy Email Encryption Projects Fail and How to Make Sure Yours Doesn’t
All too often we meet companies who tell us how their last email encryption solution didn’t work for them. They found themselves with a provider that did not deliver or perhaps they anticipated so much more then what was actually delivered. If a solution to a problem creates more problems than it solves – you…
Read MoreNew Industries Should Get Ready to Comply with the Revised Directive on Security of Network and Information Systems (NIS2)
New industries will need to comply with the revised NIS2 directive. How will these proposed changes effect your company?
Read MoreWhat Is An Insider Threat and How Do You Deal With It?
34% of data breaches in the 2019 Verizon Data Breach Report involve internal actors. Read our post to learn how to prevent insider threats.
Read MoreHow Secure Is Gmail and Outlook For Business?
Is your organisation also considering a digital transformation? Learn how email encryption and signing makes digital transformation possible.
Read More