Tag "Cyber Security Guidelines"

Back to homepage
Industry Insights

Summer heightens cyber security risks

You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat

Industry Insights

Cybersecurity Guidance for Small and Medium Organizations

Small and medium organizations are increasingly being targeted by cyber criminals, but often have limited financial and human resources available to implement comprehensive cybersecurity measures. In March 2019, the Canadian


How To Block DDoS Attacks Using Automation

DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. In this article, we’ll explore the five ways, listed below,

Industry Insights

Three Cybersecurity Essentials Your Board of Directors Wants to Know

Every executive team cares about business risk. Leaders actively trying to manage risk have realized that cyber-threats now represent the lion’s share of potential harm, and they want timely KPI


Cyber Security Roundup for June 2019

June 2019 was another very busy month for security update releases. Microsoft released updates to patch 22 critical rated vulnerabilities, Intel released 11 fixes, and there were also several critical

Expert Articles Industry Insights

Top 10 Cybersecurity Experts to Follow 2019

By Howard Dawson – Tech Writer at Surfshark, Keeping up with the trends, threats and information coming down the pipeline as it relates to cybersecurity can be challenging. Malware and

Expert Articles Software

8 WordPress tips to make your website secure

By Julian Hooks – Community Manager at  MobileSignalBoosters, For anyone running a modern website, one common problem that you are likely to run into is website security. Keeping a website

Industry Insights

Cybersecurity in the “When-Not-If” Era

Historically, cybersecurity has been seen as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm brings certainty where they used to be doubts; there will be cyber

Industry Insights

How can we give cybersecurity analysts a helping hand?

It’s tough being a cybersecurity analyst these days. Over the last few years we have been repeatedly reminded of the challenge they are now facing, primarily through the steady stream

Identity Theft

Before Blaming Hackers, Check Your Configurations

Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Click