CYBERSECURITY BLOG
August 2023: Recent Cyber Attacks, Data Breaches & Ransomware Attacks
Our monthly roundup of the Biggest Cyber Attacks, Ransomware Attacks and Data Breaches is here for the month of August 2023. Healthcare, educational institutions, VPN products,...
Energy Sector & Security: Why Energy Suppliers Need Good Cybersecurity
Cybercriminals and hackers are always on the lookout to exploit businesses' infrastructure and security vulnerabilities contributing to the energy industry's many...
How To Secure Third-Party Data Sharing?
The need for third-party data sharing has intensified past the point of no return. Collaborations, alliances, and partnerships are the new currency in the business...
The Role of Fractional CTOs in Ensuring Organisational Cybersecurity
Technology plays a huge role in business today, and this is especially true for new ventures. Without a presence on the web, it's very likely that some of their target customers...
Managed Internet Services: Empowering businesses with better Security
As a small business owner, you cannot overemphasise the importance of good internet connectivity. It’s quite well-known that the use of the Internet for various functions,...
Zoom's New Privacy Terms & What They Mean For You
Zoom became synonymous with remote work at the onset of the 2020 healthcare crisis. Its ubiquity was so widespread that from being a video conferencing tool it...
Insider Risk Management: 10 Security Best Practices for Implementation
The frequency of security incidents caused by insiders is increasing. The recent 2022 Cost of Insider Threats Global Report by the Ponemon Institute reveals that 67% of
Least Privilege Access & How to Automate it Successfully
Least Privilege Access is a critical component of cybersecurity. The principle of least privilege access mandates that every user be given the least minimal access...
Hybrid Cloud Security Best Practices for SMEs
If you want to protect your small to medium business from cyber threats, embracing hybrid cloud security is a great idea. In this article, we explore why and we also delve into...
July 2023: Recent Cyber Attacks, Data Breaches & Ransomware Attacks
What do a zoo, a general hospital, a Plastic Surgery clinic and an earthquake monitoring centre have in common? Nothing much except the fact that they are all treasure...
Virtual Data Rooms and How They’re Revolutionising Cyber Security
In an era where cyber threats are ever-present, organisations are seeking robust solutions to safeguard their sensitive data. The use of Virtual Data Rooms or VDRs...
Top Takeaways from the SEC’s New Rules on Cyber Incident Reporting
On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) released its new set of rules on Cyber Incident Management and Reporting. In a news release titled “SEC Adopts...
