In this article we outline the reasons why you need cyber awareness training for your employees, the problems with not training them and discuss what to cover in your training.
Welcome To The ITSEC BlogOriginal Cybersecurity Articles By ITSEC
Welcome to our beginners guide to phishing attacks, we will be discussing the different kinds of phishing attacks, how they target your employees and how best to avoid becoming a victim to them.
This cyber insurance whitepaper helps business leaders understand the pro's and cons of cyber insurance and takes a detailed look at what cyber insurance is, the different kinds of coverage, what cyber insurance covers and some of the problems with cyber insurance as it matures as an insurance product.
Welcome to our beginners guide to cyberinsurance, in this article we cover what it is, what it covers, what it costs and the kind of coverage you need.
OSINT means open source intelligence, in this guide we explain what it is, the different kinds of OSINT and the kinds of groups who leverage it.
DevSecOps means ‘development, security and operations’ and the whole idea behind DevSecOps is to make everyone on your development team accountable for cybersecurity.
When it comes to weighing up the costs of securing your business it is important to understand the tradeoffs between an in-house solution and MSSP’s.
Welcome to our beginners guide to the cybersecurity operations center (CSOC), covering its role, responsibilities and duties. We also cover some of the key providers of CSOC services.
The number of people using the internet is increasingly growing, with more than one million users accessing the internet for the first time each day. Cybersecurity Ventures predicts there will be 6 billion Internet users by 2022 (75 per cent of the projected world population of 8 billion), the usage rate will increase up to %90 of the world population by 2030.
Gartner recently announced a new category in their cybersecurity technology analysis called Security Operations, Analytics, and Reporting. On occasion, you will also hear cybersecurity professionals call it SOAPA (security operations analytics platform architecture) instead, perhaps because they want to punish us with yet another cybersecurity acronym, but pay them no mind, Gartner calls it SOAR and so should we.
Many organisations are increasingly becoming overwhelmed by the challenge that cybersecurity represents, the primary reason many organisations are now turning to a managed security service provider (MSSP) to help them cope, it can simply be too much to deal with for most.
If you manage the IT of your own small business, or you are responsible for managing IT, then you already know that it's a jungle out there, one with criminals behind every tree.
According to Bill Gates "the first rule of any technology used in a business, is that automation applied to an efficient operation will magnify the efficiency", and while he may not have been thinking about cybersecurity operations at the time, his thinking absolutely applies to the modern cybersecurity operations centre (CSOC).
I am not by any measure old unless you ask my nieces, but I remember when we had no internet and my niece's minds boggle at that, they think I must be ancient. How could you survive without the internet they asked me, in their minds the concept of no internet is pretty much science fiction and the thought of not having internet access scares them.
Cybersecurity analysts have noted that small to medium-sized business attack traffic has been increasing throughout 2019, unusually reaching higher levels than Telnet & SSH attack traffic. It isn't clear who is causing this as no files are uploaded, just connections from multiple countries being the root cause.
An old saying which always struck me as strange and misguided is "What you don't know can't hurt you". Of course what you don't know can hurt you, especially if it's an unseen oncoming vehicle, for example, or if you work in the cybersecurity space.