Blog
What Is An Insider Threat?
September 8, 2023
Insider threat refers to the risks posed to an organisation’s cybersecurity and sensitive information by individuals who have authorised access to the ...
Read More →
What Is Business Email Compromise?
August 15, 2023
Business Email Compromise (BEC) is a social engineering attack in which cybercriminals gain unauthorised access to a company's email account ...
Read More →
What is Smishing?
July 7, 2023
The term smishing is coined from a combination of SMS (Short Messaging Service) aka text messaging, and phishing. Smishing is the fraudulent practice of sending text messages ...
Read More →
Cybersecurity and Artificial Intelligence
June 19, 2023
The benefits of integrating cybersecurity and AI are numerous. But like many developments in technology, there exists a dark side to the development of Artificial Intelligence.
Read More →
Choosing A Managed IT Service Provider
May 16, 2023
For small and medium-sized businesses in the financial sector, creating an IT team with an extensive skill set that covers everything from cybersecurity to compliance, etc. can ...
Read More →
ISO 27001:2022 vs. 2013 – What Are The Main Changes?
April 13, 2023
In October 2022, a new and improved version of the ISO 27001 was published to address the evolving cybersecurity challenges and improve digital trust.
Read More →





