What is sensitive data, how do you define it and how to protect it A report revealed that in 2021, sensitive data was the most common target in data breaches. For example, 65% of all sensitive data incidents involve social security numbers (SSN), and 41% of incidents to personal health information because they are valuable targets. Moreover, most data breaches occur … Read More
What are cloud security metrics?
Cloud migration has surged in recent years, with an estimated 94% of companies adopting cloud services as of 2022. Predictably, cybercriminals have capitalised on this rapid shift to the cloud, and have turned their attention to finding ways to infiltrate the cyber security defences of cloud service providers. Unfortunately, as their sensitive data, applications, servers, and other assets are stored … Read More
What is network segmentation?
Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks – or subnets. This allows a company to compartmentalise different areas in its network for increased security and improved performance. Let’s take a look at network segmentation and how you can use it to make your IT infrastructure more secure. How does network segmentation work? Network … Read More
What are information security standards?
An information security standard is a series of documented processes that define how to implement, manage, and monitor various security controls. As well as providing a blueprint for mitigating risk and reducing vulnerabilities, cybersecurity standards and cybersecurity frameworks typically detail the necessary steps for achieving regulatory compliance. Let’s look at information security standards, why they’re important, and the consequences of failing … Read More
What are open ports?
Ports are a fundamental part of the internet’s communication model. All communication on the internet is exchanged via ports. Every IP address contains two kinds of ports, TCP and UDP ports, and there can be up to 65,535 of each for any given IP address. Any service that uses the internet (web pages, web browsers and file transfer services) rely … Read More
What is Data Exfiltration?
Data exfiltration is a type of security breach that occurs when a company or individual’s data is retrieved, transferred, or copied from a server or computer without authorisation. Cybercriminals are usually responsible for data exfiltration by stealing data from corporate or personal devices, such as mobile phones or computers, using various data exfiltration attack methods. Another definition of data exfiltration … Read More
How to find the right cybersecurity tools for your organisation
Choosing the right tools for cybersecurity will have a significant impact on your organisation’s ability to respond to risks. Cybersecurity tools are designed to protect organisations from cybercrime and/or malicious attacks. Tools for cybersecurity can either be proactive or reactive. In layman’s terms, this means that they can either help your organisation reduce cyber risk or, on the other hand, … Read More
Cyber insurance – do you need it?
The better your security rating, the less your insurance premiums will cost and the better protected your business will become. Cyber insurance – also known as cyber liability or cyber risk insurance – covers the losses related to damage or loss of information from IT systems and networks within your business. There are many different types of policies, but the … Read More
How to reduce security risks in supply chain
In today’s interconnected world, organisations not only have to contend with threats to their own cybersecurity, but they also have to be concerned about attacks on their supply chain as well. Supply chain risk can significantly increase an organisation’s attack surface – and the bigger the supply chain network, the more opportunities there are for a malicious actor to access … Read More