Information Theft - What is the Risk? Our research has shown that around 68% of employees will steal information…
The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…
The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…
CASE STUDY (5 Min read) The following case study details a case where SECMON1 was engaged to conduct a security…
The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…
How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…
Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…
Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…
Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…
Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…