Dark Web Price Index 2020
The dark web has a longstanding reputation as a haven for the worst kinds of criminal activity. This reputation is not wholly... Learn More
7 Key Takeaways from the IBM Cost of Data Breach Report 2020
Here are seven key takeaways from the IBM cost of data breach report 2020. 1. Remote Work Increases Incident Response Time... Learn More
Notifiable Data Breaches Report: July–December 2020
Notifications 539 Up 5% Malicious or criminal attack 58% Down 1% to 310 Human error 38% Up 18% to 204 System fault 5%... Learn More
What does Layer 8 Security provide?
Cyber Security Baseline – Human Gap Analysis The Cyber Security Baseline enables you to know and measure your staff risk. The Baseline... Learn More
Phishing Measurement Theory
How do you accurately measure the success of your security awareness phishing exercises? Simulated phishing exercises are a great way to identify... Learn More
Security awareness Training and Facilitated Learning
Facilitated Learning -Security Awareness Training When people mention Security Awareness Training, let’s be honest, no one ever woke up in the morning,... Learn More
Sobering Password Facts
The human factor can be the weakest and the strongest link in any security posture. As fallible humans, we reuse passwords. We’ve... Learn More
Have I been Hacked?
It’s not a secret that hackers don’t make victims aware of the fact that they have hacked. And that’s not without reason.... Learn More
Psychological and Security issues when working from home
Have you ever wondered what are the psychological risks and cyber security impacts are, that we encounter when our staff are asked... Learn More
What is stored on your computer and mobile device?
Most people underestimate the amount of personal details that are stored on mobile devices and computers. These devices retain a lot of... Learn More