|

The Future of Ransomware: 2022 & Beyond

Ransomware remains one of the highest priority challenges for organisations of all sizes and across all sectors in 2022.

“Ransomware is the fastest-growing cybercrime for a reason,” says Steve Morgan, founder at Cybersecurity Ventures and editor-in-chief at Cybercrime Magazine. “It’s the proverbial get-rich-quick scheme in the minds of hackers.”

|

Harmony: Check Point & Avanan

Most companies have moved away from traditional in-house on-premises hosted applications like file servers, mail servers and proxy servers for cloud-based services known as Software-as-a-Service (SaaS) applications. One of the most popular SaaS platforms I have come across is Microsoft 365 Exchange Online. The cloud-based mail platform is accessible from anywhere offers no end of features, constantly evolving to meet organisational needs. Microsoft integrates its security and mail filtering capabilities into this platform.

|

What is the SOC (Security Operations Centre) Visibility Triad?

IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.

|

Cybersecurity Awareness Month UK 2021

There have been many participants in Cybersecurity Awareness Month, such as DHS Secretary Janet Napolitano back in 2009. In 2010 during the STOP. THINK. CONNECT campaign, former U.S. President Barack Obama used this phrase as a national cybersecurity education and awareness message.

Cybersecurity Awareness Month has also had many themes to help articulate the different aspects of cybersecurity, such as education, cybercrime, law enforcement, mobility, critical infrastructure for any organisation from small to large.

|

An Interview with Vernon Poole on Cyber Security Culture

It’s an exciting concept and one that many people don’t grasp. All organisations today can potentially fall victim to a cyber-attack or cyber security outage, which can cause severe damage to its ability to operate and its infrastructure. It’s more than just cyber security awareness; it requires the whole workforce to know what the risk is and the processes that need to be followed to avoid this risk.

|

How do Endpoint Security Solutions Secure Data?

When a device connects to business networks, cybercriminals may use this connection to compromise corporate data and put the network at risk. This means that these endpoint devices need to be fully secured to prevent any potential incidents from happening. To do this, organisations must ensure that they are utilising appropriate solutions to protect the front line of their cybersecurity

|

Types of Penetration Testing

There are a variety of routes whereby a bad actor can gain unauthorised access to an organisation’s systems. They range from telephony solutions, modems, ISDN and DSL, to name a few. These systems are used for various business purposes, including; support for remote and home working by staff, dedicated connections with organisation partners and suppliers, access to public networks (e.g. Internet) and third-party networks.

|

Outsource Cybersecurity: Expectations vs Reality

Sapphire has designed its UK-based Security Operations Centre (SOC) to help organisations respond quickly to threats and receive the optimum cyber security protection available today. Organisations across the UK benefit from Sapphire’s twenty-five years of experience from network monitoring to vulnerability management and incident response. Sapphire security analysts have a wealth of knowledge.

|

How to Secure a Website – 8 Tips for Success | Sapphire

Frequently, websites have outdated software containing known security vulnerabilities this is a security risk that can be avoided. Carrying out regular software updates and ensuring that you are using the latest version of the software will typically remediate these issues by installing security patches and increasing your website security.