Data Breach

INFORMATION THEFT – THE EMPLOYEE RISKINFORMATION THEFT – THE EMPLOYEE RISK

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68% of employees will steal information…

5 years ago
Don’t Become a Victim of Cyber CrimeDon’t Become a Victim of Cyber Crime

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…

5 years ago
YOUR COMPANY HAS BEEN BREACHED!YOUR COMPANY HAS BEEN BREACHED!

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…

5 years ago
CASE STUDY – OFFICE 365 BREACHCASE STUDY – OFFICE 365 BREACH

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was engaged to conduct a security…

5 years ago
Office 365 Under Increased AttackOffice 365 Under Increased Attack

Office 365 Under Increased Attack

The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…

5 years ago
LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITYLARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

5 years ago
Application Patching – Information Security EssentialsApplication Patching – Information Security Essentials

Application Patching – Information Security Essentials

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

5 years ago
Configuring Macro Settings – Information Security EssentialsConfiguring Macro Settings – Information Security Essentials

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…

5 years ago
Application Whitelisting – Information Security EssentialsApplication Whitelisting – Information Security Essentials

Application Whitelisting – Information Security Essentials

Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…

5 years ago
Multi Factor Authentication – Information Security EssentialsMulti Factor Authentication – Information Security Essentials

Multi Factor Authentication – Information Security Essentials

Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…

5 years ago