Tag "Cyber Security Breach"

Back to homepage
Identity Theft

Are SMEs ready to finally combat cyber security breaches?

SMEs are spending little on cyber security as compared to the overall IT budget. Around 86 percent of SMEs have less than 10 percent of their total IT budget allocated

Industry Insights

Who should take ownership of your cyber security strategy?

We explore the options of who should be in charge of this increasingly important area. An organisation without a cyber security strategy is an organisation with the door open for trouble to

Industry Insights

Why you need a cyber security solution for your business

If you want to know whether your business is safe against any cyber threats, then you must generate trust when it comes to your customers or clients. When speaking about

Identity Theft

Why SOAR is a Good Bet For Fighting Mega Cyber Security Breaches

Few things keep business executives and heads of governmental agencies up at night quite like mega cyber breaches. Not only are they on the rise, but they are becoming increasingly

Industry Insights

How Big Is The Cyber Security Market, And Should You Study It?

In the last couple of years, the world has gone digital. From the ability to purchase basically anything online to how we entertain ourselves, work and communicate, we live in

IT Compliance

How Tech Culture Has Changed Since The GDPR

As we approach the one-year anniversary of the GDPR which went into effect on 25 May 2018, we can now review the benefits and pitfalls of the EU’s General Data

Identity Theft

Firms pay more to bosses following a security breach and invest less in R&D, new study finds

Bosses get paid more after cyber security breaches to maintain their firms’ reputation, research and development spending gets cut, a study finds. Security breaches in firms have been on the

Expert Articles

New platform aims to transform cybersecurity

By Jon Abbott – Chief Executive Officer at ThreatAware, A new software platform aims to transform cybersecurity by allowing managers to monitor the whole of their cybersecurity from one single