Blog

insider threats

What Is An Insider Threat?

Insider threat refers to the risks posed to an organisation’s cybersecurity and sensitive information by individuals who have authorised access to the ...
Read More →
business email compromise

What Is Business Email Compromise?

Business Email Compromise (BEC) is a social engineering attack in which cybercriminals gain unauthorised access to a company's email account ...
Read More →
what is smishing

What is Smishing?

The term smishing is coined from a combination of SMS (Short Messaging Service) aka text messaging, and phishing. Smishing is the fraudulent practice of sending text messages ...
Read More →
ai and cybersecurity

Cybersecurity and Artificial Intelligence

The benefits of integrating cybersecurity and AI are numerous. But like many developments in technology, there exists a dark side to the development of Artificial Intelligence.
Read More →
choosing the right managed it service provider

Choosing A Managed IT Service Provider

For small and medium-sized businesses in the financial sector, creating an IT team with an extensive skill set that covers everything from cybersecurity to compliance, etc. can ...
Read More →
iso 27001

ISO 27001:2022 vs. 2013 – What Are The Main Changes?

In October 2022, a new and improved version of the ISO 27001 was published to address the evolving cybersecurity challenges and improve digital trust.
Read More →