How AI & Machine Learning Boost Cybersecurity

September 26, 2022By Andrew RadfordCyber Security, Technology

The enterprise attack surface is massive; it expands and evolves continually. The larger the organisation, the more time-varying signals need to be analysed to calculate risk. This process is so layered in complexity that analysing and fortifying cybersecurity is no longer a human-scale problem. In response to this growing challenge, Artificial Intelligence (AI)-based tools for … Read More

Anatomy Of A Cyber Attack (& What To Do!)

September 4, 2022By Andrew RadfordCyber Security, Ransomware, Technology

Cybercrime has become a big business as tech-savvy criminal gangs are becoming increasingly skilled, causing larger corporations to employ dedicated cyberattack security teams. Cybersecurity goes beyond security professionals. Security is everyone’s job, from system administrators down to individual users, and education is the first line of defence. Understanding the anatomy of a cyber attack will … Read More

Using EPP For Apple and Android Mobile Devices

August 25, 2022By Andrew RadfordEndpoint Security, Technology

The recent global expansion of remote working has seen mobile device usage and cloud computing grow faster than security technologies can evolve. Consequently, cybercriminals target Apple and Android mobile devices to exploit any known or day-zero security gaps.  Up to 90% of a large corporation’s workforce is now remote. These mobile devices will become more … Read More

Adaptive Security Architecture – Explained

August 8, 2022By Andrew RadfordCyber Security, Technology

Many IT security teams that focus on preventing cyberattacks tend to adopt an ‘incident response’ mindset rather than a ‘continuous response’ as their adaptive security architecture. What’s the difference?  A continuous response approach assumes that all systems are potentially compromised and thus require constant security monitoring and remediation. Essentially, the traditional ‘prevent and detect’ approach … Read More

6 Benefits Of ISMS & How To Get Started

July 30, 2022By Andrew RadfordCyber Security, Technology

Data breaches are a growing threat to businesses, and enterprises must develop an Information Security Management System (ISMS) to mitigate these risks and protect sensitive data. The benefits of ISMS provide the robust defences needed to prepare for and defend against inevitable security breaches.  By developing and deploying an ISMS, your organisation can secure sensitive … Read More

Gaining PCI DSS Compliance: 12-Step Checklist

July 20, 2022By Andrew RadfordCyber Security, Technology

Payment Card Industry and Data Security Standards (PCI DSS) are clearly defined standards for companies accepting customer credit card payments. Carefully following the PCI compliance checklist is essential to gaining both compliance and consumer confidence when taking payment from credit card vendors. PCI DSS are regulatory guidelines drafted to protect consumers online and ensure e-commerce … Read More

8 Reasons Your Business Needs Endpoint Protection Right Now

July 18, 2022By Andrew RadfordEndpoint Security, Technology

Companies are seeing a rapid increase of remote working devices connected to their enterprise network, making the benefits of endpoint protection a must rather than a nice-to-have. More laptops, mobile phones, and tablets are getting connected than ever before. In addition, ‘smart factories’ and ‘smart cities’ are bringing even more devices online, such as Internet … Read More

10 Mobile Security Threats Leaving a Hole in Your Network

June 24, 2022By Andrew RadfordEndpoint Security, Technology

Mobile devices have completely changed our daily lives, both workday and personal time. The average person spends at least four hours on their mobile phones or tablets daily, with just over 54% of all global website traffic traversing over mobile devices (source).  Becoming increasingly powerful, mobile devices are supplementing and sometimes replacing desktops or laptops. … Read More

Spotting LinkedIn Scam Emails and Fake Job Offers

June 23, 2022By Andrew RadfordCyber Security, Technology

With over 722 million subscribers, it’s safe to say that most professionals use LinkedIn in some form, whether job hunting, networking, recruiting, or promoting a business. However, the same features that make the platform so popular and accessible make LinkedIn a significant security challenge.  Criminals create false LinkedIn profiles to perform social engineering attacks against … Read More