|

What is Cyber Security Awareness Training?

Security awareness training objective is to ensure that employees understand the role they can play in helping to enhance and enforce the organisations’ security. From understanding data protection requirements to being able to spot the telltale signs of a phishing email, your employees are your first and foremost defence against a security breach.

|

Endpoint Protection: What is NDR, EDR & XDR?

‘What are the differences between these three types of detection and response?’ Unlike legacy security tools, network detection and response don’t rely on signature-based security tools. They often can’t detect new cyber attacks unless these signatures have already been recognised as cyber attacks on a network. However, NDR works to monitor and analyse networks via built-in response capabilities.  

|

How to Lower Cyber Insurance Premiums

Cyber insurance, commonly referred to as cyber-liability insurance, is a type of insurance that aids in shielding organisations from the repercussions of hacking and cyberattacks. Cyber insurance can minimise the organisation disruption caused by a cyber incident and its aftermath with the help of cyber insurance policy coverage. It can also potentially cover some of the associated costs.  

|

CASE STUDY: SAPPHIRE UTILITY SOLUTIONS

Like all organisations, Sapphire Utility Solutions (SUS) is a target for cybercriminals. This is only exasperated by its rapid growth.

Whilst having extensive security experience within the team, SUS wanted to enhance its cybersecurity capabilities and provide the best resources for its team to take advantage of, so it decided to outsource its cybersecurity via Sapphire’s Managed Security service.

|

Harmony: Check Point & Avanan

Most companies have moved away from traditional in-house on-premises hosted applications like file servers, mail servers and proxy servers for cloud-based services known as Software-as-a-Service (SaaS) applications. One of the most popular SaaS platforms I have come across is Microsoft 365 Exchange Online. The cloud-based mail platform is accessible from anywhere offers no end of features, constantly evolving to meet organisational needs. Microsoft integrates its security and mail filtering capabilities into this platform.

|

What is the SOC (Security Operations Centre) Visibility Triad?

IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.

|

What does a SOC analyst do?

SOCs (Security Operations Centre) are cross-functional, which helps centralise operations carried out by different departments within an organisation. This means that they provide value to organisation stakeholders and help meet agendas. 

SOC analysts play a critical role in taking responsibility for security incidents and assisting in communications on security incidents.  

|

Building a Zero-Trust Strategy   

In the past, security professionals relied on traditional perimeter security such as firewalls to prevent unwanted access to their data; however, this has become progressively irrelevant in today’s modern landscape due the adoption of cloud first strategies and flexible working approach which in turn has blurred the line as to where that perimeter actually exists. 

The pandemic and cloud-first technologies have expedited this move to an extended perimeter which has driven cybersecurity professionals to prioritise a Zero-Trust strategy throughout many organisations. 

|

Five Ways to Reduce your Cyber Exposure 

Improving your cybersecurity to reduce cyber exposure is an ongoing process.

Recent data suggests that there is a cyberattack every 39 seconds. Therefore, an organisation-wide cybersecurity plan is critical to tackling the constantly changing modern threat landscape. This article will discuss the five steps you can take to reduce your cyber exposure.

|

AWS Buckets: There’s a Hole in my Bucket – Securing your Data in the Cloud 

In 2021, AWS S3 accounted for roughly 60% of breaches.  

Like most data breaches, the AWS bucket incident resulted from an incorrectly configured bucket which exposed 36GB of data to the public. The information leaked included mortgage and customer demographics.