Cyber Security Archive
Cyber security audits are a vital component of an organisation’s defences against data breaches and privacy violations. By probing organisations’ systems and services, an auditor can identify security weaknesses, and determine whether their practices comply with relevant laws, such as …
Organisations are always looking for ways to improve their security practices, and one of the most effective ways to achieve this is by providing employees with cyber security training. A Lucy Security study found that 96% of respondents agreed that a …
There has never been a better time to start a career in cyber security. Organisations’ reliance on IT technical solutions has only increased with the switch to remote working, creating a massive demand for qualified personnel. But what qualifications do …
Last year, the World Economic Forum listed cyber crime alongside climate change as two of the biggest threats society faces in the next decade. Although they might appear to be distinct problems, there are ways that they influence one another. …
Phishing is one of the most common types of cyber crime, but despite how much we think we know about scam emails, people still frequently fall victim. According to Proofpoint’s 2022 State of the Phish Report, 83% of organisations fell …
Cyber threat management is the process of identifying, analysing, evaluating and addressing an organisation’s cyber security requirements. With more than a 1,000 publicly disclosed security incidents last year – and countless others that weren’t reported – cyber security is a …
Information security management is a way of protecting an organisation’s sensitive data from threats and vulnerabilities. The process is typically embedded via an ISMS (information security management system), which provides the framework for managing information security. At the centre of …
Everybody wants to know what the future holds. Those who are a step ahead of the rest can foresee challenges and avoid falling into pitfalls, or they can spot opportunities and ride to success. This is as true in the …
Welcome to our February 2022 review of phishing attacks, in which we explore the latest scams and the tactics that cyber criminals use to trick people into handing over their personal information. This month, we look at a bogus online …
With organisations’ cyber security requirements becoming more complex and the threat of cyber attacks growing each year, many decision-makers are turning towards cyber security as a service. This approach, also known as managed cyber security, works by outsourcing cyber security …