Articles relating to cybersecurity
EI, EI.. Oh!
If you're an Enterprise Ireland client who likes to get something at an 80% discount, read on.
Articles relating to cybersecurity
If you're an Enterprise Ireland client who likes to get something at an 80% discount, read on.
What was fit-for-purpose 3 years ago may no longer be fit for purpose now. We knew this when we were 8. Now that we are responsible for the success of our organisations, why have we forgotten this?
I recommended that we regularly review the security of the back doors in our IT systems. Back door #2: Email auto-forwarding
What have the Golden Girls got to do with cybersecurity?
You may not care about disk encryption. But your regulator does. Read how many organisations put themselves (and their customers' personal data) at risk by not implementing this simple security measure.
I recommended that we regularly review the security of the back doors in our IT systems. Back door #1: The hard disk on your Windows device.
When I work with a client for the first time, I frequently encounter a fractious relationship between the client and their IT MSP (managed service provider). There are numerous symptoms to the issue. But, at its core, it usually comes down to a lack of trust between the client and the IT MSP. And it's not always the IT MSP's fault.
If you have followed my guide to cybersecurity basics for small businesses, you will have basic measures in place to defend against the most likely attacks. You then consider the next step in the cybersecurity ladder. Cyber Essentials may be that step. It is a set of requirements (split across five themes) that will help any business identify the appropriate technical security measures that should be put in place to protect against common cyber attacks.
Cyber 3-2-1: Plain English cybersecurity advice in 3 articles, 2 statistics and 1 action, including my guide to the basis of cybersecurity, insight into why small businesses are attacked, and stats on cyber insurance coverage. This week's action: Make sure your valuable data is protected by more than 8 characters.
You try to defend your home against opportunist criminals. Are you doing the same in your firm?