Cyber Security

Cyber Security Archives

Rise of the cloud – why small businesses are adopting cloud-based security

A cloud-based security solution provides SME owners with remote access to security, automatic firmware updates, built in...
employee data, obligations, cybersecurity tips, cyber-resilience

Three key cyber security questions every small-business owner must ask

Even a small-business website holds data such as customer addresses, passwords and credit card details that are consider...
zero trust, government funding, access

Considering implementing a Zero Trust strategy? Your questions answered

Because of the significant security benefits that it delivers, Zero Trust is likely to become much more widely used in t...
IT security, online security, cyber security czar, cyberinsurance

Cyberinsurance or self-insurance: dealing with the latest wave of ransomware attacks

The right type of backups can significantly mitigate the risk of significant disruption and financial losses of a ransom...
hygiene, hackers, email security, remote

Why proactive security hygiene and controls are more essential than ever

As cyber criminals are more focused on the size of the opportunity for financial gain rather than the size of the compan...
ransomware

Countering the evolving threat of ransomware

First recorded back in the late 1980s, ransomware has continued to evolve at a rapid pace, with the latest versions havi...
data-driven, social media data, technology, industry

Tackling big data problems for small businesses: unlocking the power of unstructured data

While some SMEs may be hesitant to migrate to the cloud to manage their data, the benefits in the long term should be th...
zero trust, government funding, access

Check your privilege – do you know who has access to what?

The ability to track in real-time who has access to what within a system is critical in supporting and securing your bus...
cyberattacks

With cyberattacks poised to rise how can small and micro businesses prepare?

With the right technology and practices, it’s possible to be cyber protected without being distracted from the work invo...
cyber resilient

The journey to becoming cyber resilient

SMEs need to look for gaps in their security capabilities from a people, processes and technology perspective, and take ...