How to secure passwords – why multi-factor authentication?

Why passwords are every company’s one of the biggest risks? Personal passwords should be a concern for  a security manager in every company. Managers need to prepare Identity management policies,…

Know your enemy – lessons from IDS portal

Majority of cyber attacks come from China – our threat hunting systems are showing that more than 80% detected malicious traffic come from this direction

9% of users phished in less than 3 hours. Is phishing all about human behaviour?

Phishing exploit human nature by tricking unsuspected users to click a link and enter some data – usually their username and passwords into something looking innocent  – we all know…

GDPR – an alternative approach

Can we approach GDPR in the easy to understand way – possibly. Implementation of privacy regulation GDPR explain in the simplest possible way – we can help with aspects which you cannot implement in house.

The biggest threat to cybersecurity

Reflecting on  some  recent cyber security incidents, I thought it of benefit to  write a very simple guide on  how to ‘stay safe’ – back to the basics, i.e.  no…

How we help SaaS vendors

As an SaaS vendor, the core of your operation is to provide your customers with a Web service you have developed. We have worked with a number of SaaS Vendors…

Importance of awareness

A serious security incident is a question of “when”, not “if”. In 2016 we have seen a number of remarkable news bulletins about cybersecurity incidents. For example, recently we saw…

Is firewall and antivirus enough?

Years ago the security of IT systems was focused on antivirus and firewalls. However, it is important to understand that antivirus was only able to detect and analyse processes which…

When lack of risk assessment means less money

  Over the course of several months, and during our discussions with various board members, ‘cyber security’ is often compared to an insurance policy, in that it is a requirement…

Cyber espionage – top of the list – defence in depth as response

      The latest research from Trend Micro Incorporated, reveals that 20% of global organisations rank cyber espionage as the most serious threat to their business, with a quarter…

GDPR – brief overview of requirements

Europe’s General Data Protection Regulation (GDPR) will come into effect on May 25th 2018, necessitating all organisations that process data of EU residents with less than 12 months to meet the…

Prepare for cyber threats

A serious security incident is a question of “when,” not “if.” In 2016 and 2017 we have seen number of spectacular news about cybersecurity incidents. We have seen a very…

Cybersecurity Awareness Campaign

Regardless of how advanced the technological protective measures are, often the weakest part of any Information Security Management System is people or end users. It is critical to ensure that…