Month: July 2019

Sapphire proudly sponsors the fourth Scottish Cyber Awards

We are delighted to sponsor Scottish Cyber Awards 2019! This flagship event will recognise Cyber Security innovators, pioneers and leaders and will bring Scottish cyber community together to celebrate its achievements. The awards has become one of the most influential nights in the Scottish cyber calendar. As the event is growing every year it is becoming more significant for the winners and finalists, leading to increased investment, new opportunities and plaudits for those successful.


Continue reading

Read this research paper to understand the alarming perception gap between IT leaders and employees over the likelihood of insider breaches.

You'll come away with insight into why:

  • 79% of IT leaders believe that employees have put company data at risk accidentally in the last 12 months
  • 60% of IT leaders believe that they will suffer an accidental insider breach in the next 12 months
  • 23% of employees who intentionally shared company data took it with them to a new job
  • 55% of employees that intentionally shared data against company rules said they didn't have the right tools for sharing securely

Fill in the form below and gain access to your free research report.


    THE North East’s largest cyber festival is returning this autumn – and will be even bigger and better.

    The inaugural #CyberFest event was organised by regional IT champions Dynamo North East last September. Six events were held throughout the region, which featured 40 speakers and were attended by more than 500 delegates.

    Phil Jackman, Dynamo Cyber Security Lead and one of the organisers of #CyberFest, said: “#CyberFest raises awareness of the North East as a place to address cyber resilience and to educate and inform of the threats and opportunities from cyber. But it isn’t just about cyber security and resilience, it’s about the huge opportunities and how local businesses can grow their businesses.


    Continue reading

    Microsoft Office 365 is the most popular application used by Okta's customers. This eGuide starts with data from the Okta Integration Network on the trends we are seeing around Office 365 and some interesting insights. It moves on to describe some of Okta's unique value additions that result in simple, speedy, deployments of O365 and other cloud applications. Finally, there is a discussion on how to leverage the identity architecture to get the lowest total cost of ownership and the agility to modernize IT.


      16 July 2019 –Sapphire today announced a new partnership with The Risk Management Group (TRMG). The partnership enables Sapphire to enhance its existing training and awareness portfolio by delivering engaging and informative sessions tailored for specific industries or job roles to businesses UK wide.

      The partnership allows Sapphire to develop and deepen its existing offering which comprises of a managed security training and phishing awareness service, forensic readiness courses and various IT, audit, security & risk management courses.


      Continue reading

      Microsoft Office 365 Is One of the Fastest-Growing Cloud-Based Applications Today.

      Reports have estimated that by 2021, nearly three-quarters of business users will be substantially provisioned with cloud-based office productivity capabilities, like Office 365.

      However, Office 365 security, particularly the security of its email capabilities, is a source of concern for users of the cloud-based service. The apprehension is not only felt by organizations migrating to or adopting Office 365, but it has also been covered by industry analysts, and has even been analyzed and publicized by Microsoft.

      This White Paper Answers the Questions:

      • Are Office 365 email security and Microsoft's add-on subscription services 'good enough'?
      • Does legacy detection protect users from new, sophisticated advances in malware and its delivery mechanisms?
      • What solutions will address the gaps in email and web security left unaddressed and that are assailable by attackers in Office 365?

        • 1
        • 2