Personal Devices Connected To Work-related Resources, Have You Invested In Securing Remote-Working?
Given the current situation of the continued existence of the pandemic. Millions of employees continue to work from home to fulfill their work obligations and…
Is your remote working secure?
When Jane received a brand-new laptop and a smartphone as part of her home working package, she was elated. “Every crisis comes with a silver…
Too many passwords!! What should I do?
As technology takes shape, more applications are cropping up, more social network forums, more devices that require me to sign in for me to access…
Why Assess The Awareness of Your Staff To Enhance Your Resilience?
As the saying goes “you’re not hurt and care less about what you don’t know”. Over time you may wonder how secrets between two people…
Why Should Organizations Consider Intrusion Detection A Priority?
In a digitally more connected world today, intrusions have consistently scaled. The outcomes from these intrusions have contributed to financial loss where those intrusions have…
Why segment your network?
Many of today’s enterprise IT environments are linked to multiple vendors and other interconnected devices to optimize business operations. However, the corporate network’s security is…
Enterprises must comply with Information Security Policies
Why information security policies? As so many organizations (SMEs and Large enterprises) adopt technology in their daily operations, shifting from data-driven decision-making to cloud adoption,…
The successful path of hunting down your data
Given the tremendous growth of cyber threats today has not only caused an impact on personal data but also boosted the rise of the cost…
Summit Cybersecurity Project Frontline Report 2020 launch
The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines…