Blogs

3 habits to maximise device security
Security Behaviour

Maximising device security: 3 habits your team should implement

What actions does your organisation take to maximise device security? Perhaps you use a technology solution, such as endpoint management, …

Read More »
The importance of adding web safety to your cyber security awareness program
Security Behaviour

The importance of adding web safety to your cyber security awareness program

Like phishing training, password management and physical security, safe web browsing should be a key component of your cyber security …

Read More »
5 ways to revitalise your team’s cyber security habits in the new year
Security Behaviour

5 ways to revitalise your team’s cyber security habits in the new year

As you set business goals and agendas for the new year, I encourage you to revisit your team’s cyber security …

Read More »
3 reasons to use gamified training for cyber security
Security Behaviour

Where your current cyber security training program falls short

Is cyber security training a box-ticking exercise in your organisation? For too many companies, cyber security training exists to satisfy …

Read More »
Why implement an account lockout policy in your business?
Security Behaviour

Account Lockout Policies: A strong defence against unauthorised logins

Brute force attacks are one method that threat actors use to guess a password and gain access to business accounts. …

Read More »
Unmasking multi-factor authentication risks
Hints and Tips

Unmasking the hidden risks of multi-factor authentication

When talking about boosting cyber security in an organisation, many leaders will highlight enforcing multi-factor authentication (MFA) as a solid …

Read More »
5 steps to building an insider threat program
Security Behaviour

5 ways to prevent insider threats in your business

When thinking of cyber security threats, you likely imagine an external actor forcing access to your business. In reality, the …

Read More »
Practical strategies for mitigating the risks of Business Email Compromise
Security Behaviour

Practical strategies for mitigating the risks of Business Email Compromise

Despite many other communication platforms becoming central to how we communicate at work, email has remained a key target for …

Read More »
Are AI attacks the next big cyber security challenge for businesses?
Security Behaviour

Are AI attacks the next big cyber security challenge for businesses?

AI has permeated various aspects of our personal and professional lives, from the voice assistants in our homes to the …

Read More »
8 essential components of a solid cyber security plan
Security Behaviour

8 essential components of a solid cyber security education plan

Many of us have made the move to digital workplaces. We hold meetings, send messages, collaborate and share data on …

Read More »
cyber security awareness
Security Behaviour

How cyber awareness training can transform your MSP business

As a Managed Service Provider (MSP), you are responsible for assisting your clients with protecting their IT infrastructure, which increasingly …

Read More »
impact of ransomware
Security Behaviour

What are the enduring impacts of ransomware on your business?

Ransomware attacks have emerged as a significant threat to businesses of various industries and sizes. These attacks are particularly insidious …

Read More »