Nowadays, cyber resilience is crucial for success
Business has evolved rapidly in the last few months, and remote working is one of the many changes which seem set to stay. But while we take advantage of new opportunitie...
SOC 2 compliance and why it’s important
If a colleague in Finance mentions “sock two,” they’re not referring to clothing that’s been lost in the wash. The “SOC” in SOC 2 stands for System and Organization Contr...
Document security in daily business processes
Data drives business. It’s more available today to aid decision making than ever before. This makes it more valuable than ever. As we’ve learned from the seeming multitud...
Protecting your organization against ransomware
Ransomware attacks continue to grow in number and sophistication. If you are responsible for IT and security management in your organisation, knowing how to protect your ...
FAQs to address the threat of ransomware
When a cyber threat grows in magnitude by 35 times in one year, and continues to become even more prevalent the next, every organization should pay attention. Cyber crimi...
Six simple ways to enhance account security
Using technology to crack passwords is not a new concept. In fact, if you think back to how Alan Turing cracked Enigma during World War II, as shown in The Imitation Game...
SMBs must be serious about information security
It seems that many small businesses have a “bigger fish to fry" mentality concerning information security. Small and midsize businesses (SMBs) tend to think they're safe ...
How you can create value through compliance
This article is not meant to convince you of the merits of RFID-blocking wallets and underground bunkers. We all read the security breach headlines, pray for litigation c...