Why Security Is A People Problem?

Introduction In recent years, some of the largest data breaches have been a direct result of human error, security is a people problem. The consequences of these events are often unintended losses that are caused by people who mistakenly activate malware by opening unknown emails or clicking on malicious links. […]

Read more

Why third parties pose a security risk to your business.

Businesses today mostly rely on third-party service providers and vendors for outsourcing the various business functions.  The risk of cyber-threat from third-party service providers is mainly to large companies as a lot of sensitive data and internal systems to improve service delivery and cost-effectiveness. This interconnectivity leads to changes in […]

Read more
VPN Remote Access

VPNs Are Here To Stay

Introduction There is no denying to the fact that VPNs are here to stay for quite a long time, as they provide several existing solutions for securing the data of the organization. It is one of the significant and necessary components for every company’s cybersecurity and infrastructure. In today’s digitalized […]

Read more
Security Culture

Security Culture

How “Security Culture” Affects an Organisation’s Risk of a Potential Breach Over the last 2 years announcements by Marriott, British airways, Travelex and now EasyJet on how their systems were compromised and breached by nefarious actors this must now have every business large, small or enterprise thinking about its current […]

Read more

What does good look like? Part one

Part one Preamble  We always hear the words in security “good practice”, “good security” and so on. But what does good mean? From the GDPR it uses the lovely phase of “Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and […]

Read more

CISO: First 30 days

Intro I have seen quite a few articles on what CISO’s should concentrate on so I am going to give you my opinion. So you have just landed a new role as CISO so after induction (if you don’t have one add it to the list of items to resolve) […]

Read more