How to define sensitive data and the means of protecting it 

Define sensitive data and how to protect it

What is sensitive data, how do you define it and how to protect it A report revealed that in 2021, sensitive data was the most common target in data breaches. For example, 65% of all sensitive data incidents involve social security numbers (SSN), and 41% of incidents to personal health information because they are valuable targets.   Moreover, most data breaches occur … Read More

What are cloud security metrics?

cloud security metrics

Cloud migration has surged in recent years, with an estimated 94% of companies adopting cloud services as of 2022. Predictably, cybercriminals have capitalised on this rapid shift to the cloud, and have turned their attention to finding ways to infiltrate the cyber security defences of cloud service providers.   Unfortunately, as their sensitive data, applications, servers, and other assets are stored … Read More

What is network segmentation?

What is network segmentation

Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks – or subnets. This allows a company to compartmentalise different areas in its network for increased security and improved performance.  Let’s take a look at network segmentation and how you can use it to make your IT infrastructure more secure. How does network segmentation work?  Network … Read More

What are information security standards? 

What are information security standards

An information security standard is a series of documented processes that define how to implement, manage, and monitor various security controls. As well as providing a blueprint for mitigating risk and reducing vulnerabilities, cybersecurity standards and cybersecurity frameworks typically detail the necessary steps for achieving regulatory compliance.     Let’s look at information security standards, why they’re important, and the consequences of failing … Read More

What are open ports?

What are open ports

Ports are a fundamental part of the internet’s communication model. All communication on the internet is exchanged via ports. Every IP address contains two kinds of ports, TCP and UDP ports, and there can be up to 65,535 of each for any given IP address.   Any service that uses the internet (web pages, web browsers and file transfer services) rely … Read More

What is Data Exfiltration?

What is data exfiltration

Data exfiltration is a type of security breach that occurs when a company or individual’s data is retrieved, transferred, or copied from a server or computer without authorisation. Cybercriminals are usually responsible for data exfiltration by stealing data from corporate or personal devices, such as mobile phones or computers, using various data exfiltration attack methods.  Another definition of data exfiltration … Read More

How to find the right cybersecurity tools for your organisation

How to find the right cybersecurity tools

Choosing the right tools for cybersecurity will have a significant impact on your organisation’s ability to respond to risks.  Cybersecurity tools are designed to protect organisations from cybercrime and/or malicious attacks. Tools for cybersecurity can either be proactive or reactive. In layman’s terms, this means that they can either help your organisation reduce cyber risk or, on the other hand, … Read More

Cyber insurance – do you need it?

Cyber insurance - do you need it?

The better your security rating, the less your insurance premiums will cost and the better protected your business will become.  Cyber insurance – also known as cyber liability or cyber risk insurance – covers the losses related to damage or loss of information from IT systems and networks within your business. There are many different types of policies, but the … Read More

How to reduce security risks in supply chain 

How to reduce security risks in supply chain 

In today’s interconnected world, organisations not only have to contend with threats to their own cybersecurity, but they also have to be concerned about attacks on their supply chain as well. Supply chain risk can significantly increase an organisation’s attack surface – and the bigger the supply chain network, the more opportunities there are for a malicious actor to access … Read More