Information Security

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…

5 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was engaged to conduct a security…

5 years ago

Office 365 Under Increased Attack

The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…

5 years ago

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

5 years ago

Application Patching – Information Security Essentials

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

5 years ago

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…

5 years ago

Application Whitelisting – Information Security Essentials

Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…

5 years ago

Multi Factor Authentication – Information Security Essentials

Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…

5 years ago

User Application Hardening – Information Security Essentials

User Application Hardening While useful for many business operations, applications like Flash, Java, Adobe Acrobat and certain features in Microsoft…

5 years ago