Is your business prepared and ready to continue in the event of a cyber-attack? All organisations will experience an information security incident at some point. Investment in establishing effective incident…
Are you sure that all of the users on your system have the correct access privileges? Have you removed access rights for leavers? According to the IBM Cyber Security Intelligence…
Are all endpoints, servers and networks securely configured? By putting in place corporate policies and processes to develop secure baseline builds and manage the configuration and the ongoing functionality of…
“ Is the use of removable media devices such as USB sticks properly controlled? “Removable media such as USBs and SD cards account for 30% of malware infections” Kaspersky Failure to…
Do you have robust malware defences? Any information exchange carries a degree of risk as it could expose the organisation to malicious code and content (malware) which could seriously damage…
93% of DPA breaches are caused by human error People: the weakest link in the cyber security chain. The Information Commissioner’s Office reported that 93% of incidents it investigated in…