7 measures breached organisations whished they had

Security breaches happen in minutes, but take months to discover — and 90% of them start with an email.
Too often, cybersecurity is reactive. Effective protection from evolving threats and new attack vectors starts with anticipating the attack, rather than responding. Hours invested in prevention could preclude millions in cleanup costs. Take advantage of free tools that prevent clandestine weaponization of domains, and develop an understanding of how basic configurations affect overall security posture.

On Demand

Read our latest articles on cybersecurity

Cyber News: UK data watchdog issues hack alert after SolarWinds’ data breach

A major cyber attack used the US firm SolarWinds’ Orion platform. The attack threatened US national security, through targeting numerous  US government departments. Security officials […]

The evolution of computer malware: How did we get to where we are

Security professionals having been battling with computer viruses for decades. To date, not only have industries accumulated billions of dollars in losses, malware attacks have […]

A Discussion about Phishing, the impacts and prevention.

In this video, we have a discussion with Alec Aronson, a cybersecurity specialist from Networks Unlimited about the dangers and impact of Phishing scams or [...]