You've tackled some big challenges recently. Huge legislative payroll changes plus the technical issues of trying to manage payroll remotely during lockdown, often using systems and processes that haven't changed…
For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today's cloud-based, mobile and remote work setting, that perimeter has all but dissolved. Learn…
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and Legal Teams
Business collaboration tools and social media have been a lifeline for modern organisations.…
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and…
In today's business landscape, more people are working remotely. Far-flung teams work together across geographies and time zones. And your users are finding new ways to collaborate. Is your organization…
Most security leaders know that insider threats are serious and evolving cybersecurity risk. But many struggle with communicating those risks to other executives—and getting buy-in to make investments that count.…
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring and communicating the impact of your security awareness program to…
More than 90% of cyberattacks start with email. But as organisations continue to shift their systems to the cloud, cyber criminals are shifting their tactics by blending both email and…
Real-Life Tales of Data Loss, Insider Threats and User Compromise
Data doesn't lose itself. People lose it. But in today's distributed, cloud-first work environment, few IT departments have visibility into people-caused…
Organisations are moving to the cloud and must support today's remote and distributed workforce. For many, Microsoft 365 is a whole new way of doing business—one that requires a whole…
Cybersecurity awareness training is one of the most important things you can do to secure your organisation. But starting a new programme may seem daunting. Maintaining one that keeps your…
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed close behind. This cloud account compromise threat brief…