Covid-19: How to reduce the risk of the growing attack vector…

Due to the unprecedented impact of Covid-19, businesses have undergone a seismic change in recent weeks as millions are forced to work from home. This shift away from usual practices is a greatly anticipated change for many employees. However, as firms are under immense pressure to quickly implement a remote working strategy, the necessary security considerations are taking a back …

Could Covid-19 bring your business to a halt?

Ready or not, UK businesses are about to face a sudden remote-working test run. Since Covid-19 first took root in Wuhan China early this year, businesses across the globe have been forced to allow widespread remote working to minimise the risk of contagion. However, many IT teams and business owners are questioning whether their infrastructure has the capacity to support …

How to open the ‘window of visibility’ into your network

Every infrastructure has its weaknesses. However, if you are not able to identify these weak spots and their potential impact on your business, it is impossible to have a comprehensive view of the security and reliability of your network. ‘Network visibility’ is one of the most talked about concepts in the networking world right now. Unfortunately, without access to the …

Closing the ‘cyber-gap’ for SME’s

Businesses around the globe are rapidly becoming more dependent upon digital technology. This is no longer used to simply function as a business, it also improves efficiency, connects departments and improves customer satisfaction. While this digital boom undoubtedly has its benefits, small businesses are faced with many challenges when it comes to securing their vital infrastructure. Surprisingly, now that there …

How to stay safe from cloud security threats

Unsurprisingly, ‘the cloud’ has absolutely nothing to do with those white fluffy things in the sky. Essentially, the cloud is a way of storing and accessing data on a server separate to your corporate network. To enable the effective running of popular cloud applications like Dropbox, there are often numerous internet-connected computers situated across the globe. ‘Cloud Computing’ simply uses …

How can Cisco Duo help you achieve ISO 27001 compliance?

Having secure, effective password policies across your corporate accounts is more important than ever before. For obvious reasons, cyber-criminals are desperate to get their hands-on passwords as they are the key to open your private accounts. There isn’t a week that goes by that there isn’t another story in the press about a largescale password leak. Worryingly, 80% of hacking-related …

The cyber-bullying epidemic- How to safeguard students from online trolls

Over the last decade there has been an unprecedented rise in the use of digital technology. So much so that our mobile devices and the use of social media permeate into almost every corner of our lives. This tech-evolution undoubtedly provides countless benefits for the global population.  However, in many cases it can also be a double-edged sword. Although social …

Recent Verizon report shows worrying global drop in PCI Compliance

Verizon has recently published the ‘2019 Payment Security Report’ which highlighted a worrying decrease in PCI compliance.  According to new statistics, global compliance is at a record low of just 36.7%, this is now the second year in a row that PCI compliance has decreased. Verizon discovered that the highest PCI compliance rate is in the Asia-Pacific region at 69.6%, …

Black Friday hacking season: the top 9 red flags

Another year brings yet another Black Friday shopping frenzy. This annual shopping event may be a great opportunity for Christmas shoppers to bag a few festive bargains. However, in the mad rush to land the best discounts, shoppers often drop their guard and become easy targets for cybercriminals. In the UK, it is predicted that spend will increase by 3.4% …

Protecting Office365: Are built-in security features enough to protect your data?

As our email accounts are the backbone of business communications, it is of no surprise that they have become a magnet for cyber criminals. But do you have advanced email security controls protecting this ‘treasure trove’ of corporate information? Unfortunately, many businesses are still depending on bare minimum-security features offered by email providers such as Office365 to protect their critical …