Contact Us
Contact UsWhether you’re just starting to look or already have a budgeted project, we’d love to talk. Tell us a bit about you, and a real human will get in touch with you to set up a chat at your convenience. We look forward to speaking with you. CHAT WITH US
I'm a customer and need supportSUPPORT
...
Blog
DMARC - The Next Step in Email Hygiene and Security
By Anirudh Chand on Tue, 04/30/2024
In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers. In 1996, Sabeer Bhatia...
Blog
12 Essential Tips for Keeping Your Email Safe
By Katrina Thompson on Thu, 07/06/2023
Hey, did you get that sketchy email? You know, the one from that malicious hacker always trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You clicked on it? Uh-oh...A hypothetical scenario, but one that plays out every day in organizations across the globe. The truth is that it is a very real scenario...
Blog
Is any organisation risk and data breach free?
By Guest Authors on Tue, 07/26/2022
I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite.
"We don't accept any risk. We're risk-averse" said the CEO. But, is this achievable?
Given the complexity of our modern world, with diversity in...
Blog
The State of Data Security in 2022: The CISOs Perspective
By Guest Authors on Mon, 07/25/2022
In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is now spread across a wider attack surface, putting it at a heightened risk of becoming a compromised risk. The manner and location of data storage and...
Blog
Cybersecurity in city government, taken to new heights: An Interview with Shane McDaniel
By Joe Pettit on Sun, 07/24/2022
When most people speak of any city government, they often mention words like “Bureaucratic”,
“Behind the times”, and “Slow.” This is especially true when considering cybersecurity initiatives. However, a small town in Texas is changing that view. Seguin, Texas, which was once the smallest Texas city to have a full-time cybersecurity employee, was...
Blog
5 Stages of Vulnerability Management Program Best Practices
By Matthew Jerzewski on Mon, 07/22/2024
Vulnerability management (VM) is a fundamental cybersecurity control focused on finding errors and weaknesses in software called vulnerabilities and correcting them. Vulnerability management is a foundational cornerstone for reducing your organization’s cyber risk, but what are vulnerabilities and why is it important to create a strong vulnerability management program? The National Institute of...
Blog
The State of Security: Malware in 2022
By Guest Authors on Sun, 07/17/2022
Among the many challenges businesses contend with in the global marketplace today, the 11th Allianz Risk Barometer 2022 ranks cybersecurity threats as the most important business risk. This proves beyond any doubt that enterprises are experiencing increasing threats and full-on attacks to their information technology systems. To safeguard their...
Blog
VERT Threat Alert: July 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 07/12/2022
Today’s VERT Alert addresses Microsoft’s July 2022 Security Updates. VERT is actively working on coverage for these Patch Tuesday vulnerabilities and expects to ship ASPL-1011 on Wednesday, July 13th.In-The-Wild & Disclosed CVEsCVE-2022-22047Microsoft is reporting this month that a single vulnerability in the Windows Client/Server Runtime Subsystem ...
Blog
CISO Interview Series: The challenges of being the CISO for the University of Oxford.
By Guest Authors on Sun, 07/03/2022
The job of a CISO is one of constant change and unexpected challenges. One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars. This is an audience not known for slow-motion progress. They...
Blog
How to Protect Your Remote Workforce from a Cyberattack
By Guest Authors on Sun, 06/26/2022
Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.
In addition, there is a worldwide...
Blog
What you need to know about PCI 4.0: Requirements 5, 6, 7, 8 and 9
By David Bruce on Wed, 06/22/2022
In Part 1 of this series, we reviewed the first four sections of the new PCI standards. As we continue our examination of PCI DSS version 4.0, we will consider what organizations will need to do in order to successfully transition and satisfy this update.
Requirements 5 through 9 are organized under two categories:
Maintain a Vulnerability...
Blog
Reexamining the “5 Laws of Cybersecurity”
By Guest Authors on Sun, 06/19/2022
Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are:
Treat everything like it’s vulnerable...
Blog
Cyberthreat Defense Report 2022: Key Points You Should Know
By Guest Authors on Sun, 06/19/2022
Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing.
Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision...
Blog
Interpol arrests thousands of scammers in operation "First Light 2022"
By Graham Cluley on Thu, 06/16/2022
Law enforcement agencies around the world appear to have scored a major victory in the fight against fraudsters, in an operation that seized tens of millions of dollars and seen more than 2000 people arrested.
Operation "First Light 2022", running for two months from March 8 2002 until May 8 2022, saw 76 countries clamp down on organised crime...
Blog
VERT Threat Alert: June 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 06/14/2022
Today’s VERT Alert addresses Microsoft’s June 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1007 on Wednesday, June 15th.
In-The-Wild & Disclosed CVEs
None of the vulnerabilities patched this month have been exploited in-the-wild or publicly disclosed according to Microsoft. However,...
Blog
Stronger Together: 4 things to do at Infosecurity Europe 2022
By Adam Parlett on Mon, 06/13/2022
Following a two-year suspension of its live conference, Europe’s largest information security event Infosecurity Europe returns, welcoming in-person attendees at London’s ExCel Centre between June 21st and 23rd. Reed Exhibitions announced in December that the theme of this year's conference would be Stronger Together, a continuation of 2021’s...
Guide
Multi-Cloud Security Best Practice Guide
When you opt to use multiple cloud providers, you’re implementing a multi-cloud strategy. This practice is increasingly common, and can refer to mixing SaaS (software as a service) and PaaS (platform as a service) offerings as well as public cloud environments that fall under the IaaS (infrastructure as a service) category. The most common public cloud environments today are Amazon Web Services ...