Why are humans the biggest insider threat to your business?

Why are humans the biggest insider threat to your business?

Employees have long been viewed as the ‘weakest link’ in a business’s cyber security chain and, with human error still being the number one cause of data breaches, that unwanted title can still be applied to many businesses today. But what makes employees such an insider threat to your business?  In this article, we’ll guide you through […]

Cyber Insurance Checklist: 10 Essential Security Controls

Cyber Insurance Checklist: 10 Essential Security Controls

The never-ending threat of a cyberattack is leading more and more businesses to take a serious look at cyber security insurance to help them recover some of the financial losses that would result from an attack or incident. While a continuing rise in attacks is making cyber insurance more attractive, so too, is it making […]

Understanding The Cyber Kill Chain

Understanding The Cyber Kill Chain

An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity.

Sextortion Email Scam

Sextortion Email Scam

Sextortion email scams have been around for quite some time and every now and then a new wave will target the inboxes of unsuspecting victims. This once again appears to be the case and we have noticed an increase in requests for advice on how to handle this.