How Software Patches Make or Break Your Cyber Security Plan

How Software Patches Make or Break Your Cyber Security Plan

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

You have set up your core and edge cybersecurity procedures.  You have defined policies and procedures to be followed to limit the possibility of malware attacks.  You have a dedicated team monitoring cybersecurity concerns.  You consider that you have done all you can do to achieve comprehensive coverage.  Is that enough? The cybersecurity environment is […]

Commonly overlooked issues that open security holes in your business

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Online Security is a pressing concern for all IT Heads.   The increasing incidence of malware, both in itself and in new distribution vectors is a real headache.  Most of the common threats are well documented as are preventative measures and recovery techniques.  There are, however, a few issues that are often overlooked causing gaps in […]

Types of malware distribution strategies you need to prevent

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

The online security war between hackers and and anti-malware developers has moved on to keep pace with the development of new technologies.  As new malware is detected and blocked, the hackers invent new malware and are expanding into new distribution vectors. Online Security is not only anti-malware applications and devices. It is an attitude of […]

How To Minimise Cyber Attacks While Technology Usage Increases

How To Minimise Cyber Attacks While Technology Usage Increases

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

One of the major talking points around ICT is IT Security.  Cyber attacks have increased in frequency, intensity and sophistication.  Many sites have been hacked and personal and financial information stolen.  In parallel, cyber security solutions have grown to match their sophistication and effectiveness.  Both technology trends and in the way in which people use […]

Why User Training is the first line of defence in cyber attacks

Why User Training is the first line of defence in cyber attacks

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

It’s not a question of if you will suffer a cyber attack, it’s more a question of when. Experts say that the only fully secure systems are those that have not been hit yet.  You may have made all the preparations, implemented malware protection software and firewall appliances, configured your network securely, and carried out […]

3 Tips on how to keep your online privacy safely in 2018

3 Tips on how to keep your online privacy safely in 2018

Posted on Leave a commentPosted in Cybersecurity, Insights, Tips

Everyone is apprehensive about their Internet presence. They base their online security around freeware anti-virus packages.  They wonder how spammers found their email address, there is the twinge in the stomach when they initiate an on-line purchase.  They read in the media of cyber stalking, identity theft, they read of stolen credit card details, they […]

Why SSL Certificates are essential in your business website

Why SSL Certificates are essential in your business website

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

There has been a massive increase in the volume and sophistication of malware and malware attacks detected recently.  Two website security scenarios that give Heads of IT sleepless nights are hijacking of their business website and data theft.  Users are particularly concerned about fake websites, particularly banking and other finance websites that require personal banking […]

Think like a cyber criminal: Understanding strategies and learning to how to defend

Think like a cyber criminal: Understanding strategies and learning to how to defend

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

The increasing sophistication of malware attacks on any commercial site or personal computer indicates a corresponding increase in the scale and sophistication of the preventative and recovery measures needed. A large organisation might keep its cyber security function in-house and develop its own strategies.  Smaller organisations are increasingly turning to Internet Security Services to assist […]