Vulnerability scanning 101: Best Practices for Vulnerability Scanning By Alex Harper - November 10th, 2021 Posted in Information Security cyber attacks, cyber security, information security, patches, scanning, vulnerabilities, vulnerability scan Companies today face the ongoing task of securing complex information technology (“IT”) environments, while achieving their business obje...
Penetration testing partner: how to choose the right one for your business By Alex Harper - August 8th, 2021 Posted in Penetration Testing cyber attacks, cyber crime, cyber security, information security, pen test, pen testing, penetration test, penetration testing Organisations of all shapes and sizes are grappling with the challenge of cyber security. The business landscape is evolving quickly. Dig...
Phishing emails – how to identify them – 2021 update By Chris Hawthorn - July 1st, 2020 Posted in Information Security business, cyber attacks, cyber crime, cyber security, data breach, email fraud, infosec, inormation security, online crime, phishing It’s no surprise that the last 18 months have seen a surge in cyber crime, largely due to the COVID-19 pandemic, millions of workfo...