Your Guide to the Cyber Essentials Certifications Table of Contents Toggle What is the Cyber Essentials scheme?1. Have a firewall installed2. Use secure configurations3. Control user access4. Protect yourself against malware5. Make sure software and devices are...
What is a Firewall and How to Choose the Right one for you Table of Contents Toggle What is a firewall?Why does my organisation need one?Different types of firewallsWhat should I look for in my firewall? When a layperson is asked about cybersecurity, “firewall” is...
Does your Organisation Need Mobile Device Management? Table of Contents Toggle The rise of BYOD cultureWhat to include in a personal mobile device policy?What is MDM software?Manage personal devicesControls employees accessSecure storageLimitations of MDM softwareDo I...
What Happens in a Security Audit? Table of Contents Toggle What Is a Security Audit?Why Do Companies need IT Security Audit?Consequences of Security BreachFinancial LossPublic Image DestructionLegal ConsequencesInformation LossHow Long Does a Security Audit Take?How...
Deep Web vs Dark Web – What’s the Difference? Table of Contents Toggle Surface web definitionDeep web definitionDark web definitionSo what now? The terms “deep web” and “dark web” are ones often thrown around in the media pretty much interchangeably, but there are...