-
How to secure passwords – why multi-factor authentication?
Why passwords are every company’s one of the biggest risks? Personal passwords should be a concern for a security manager in every company. Managers need to prepare Identity management policies,… Read more
-
Know your enemy – lessons from IDS portal
Majority of cyber attacks come from China – our threat hunting systems are showing that more than 80% detected malicious traffic come from this direction Read more
-
9% of users phished in less than 3 hours. Is phishing all about human behaviour?
Phishing exploit human nature by tricking unsuspected users to click a link and enter some data – usually their username and passwords into something looking innocent – we all know… Read more
-
GDPR – an alternative approach
Can we approach GDPR in the easy to understand way – possibly. Implementation of privacy regulation GDPR explain in the simplest possible way – we can help with aspects which… Read more
-
The biggest threat to cybersecurity
Reflecting on some recent cyber security incidents, I thought it of benefit to write a very simple guide on how to ‘stay safe’ – back to the basics, i.e. no… Read more
-
Cyber risk landscape is changing
Advanced Persistent Threat – ATP – enforce changes to the approach to cybersecurity – we can help with transformation. Read more
-
How we help SaaS vendors
As an SaaS vendor, the core of your operation is to provide your customers with a Web service you have developed. We have worked with a number of SaaS Vendors… Read more
-
Importance of awareness
A serious security incident is a question of “when”, not “if”. In 2016 we have seen a number of remarkable news bulletins about cybersecurity incidents. For example, recently we saw… Read more
-
Is firewall and antivirus enough?
Years ago the security of IT systems was focused on antivirus and firewalls. However, it is important to understand that antivirus was only able to detect and analyse processes which… Read more
-
When lack of risk assessment means less money
Over the course of several months, and during our discussions with various board members, ‘cyber security’ is often compared to an insurance policy, in that it is a requirement… Read more
-
Cyber espionage – top of the list – defence in depth as response
The latest research from Trend Micro Incorporated, reveals that 20% of global organisations rank cyber espionage as the most serious threat to their business, with a quarter… Read more
-
GDPR – brief overview of requirements
Europe’s General Data Protection Regulation (GDPR) will come into effect on May 25th 2018, necessitating all organisations that process data of EU residents with less than 12 months to meet the… Read more
-
Prepare for cyber threats
A serious security incident is a question of “when,” not “if.” In 2016 and 2017 we have seen number of spectacular news about cybersecurity incidents. We have seen a very… Read more
-
Cybersecurity Awareness Campaign
Regardless of how advanced the technological protective measures are, often the weakest part of any Information Security Management System is people or end users. It is critical to ensure that… Read more
Welcome to my blog!
I’m Amy, a minimalist and simple living enthusiast who has dedicated her life to living with less and finding joy in the simple things. Through this blog, I aim to share my expertise, insights, and experiences. Join me on this journey as we explore the world of slow, purposeful living together!
Find us on:
Join the fun!
Stay updated with our latest recipes and other news by joining our newsletter.
You must be logged in to post a comment.