compliance

Supplier cyber security audits – What are they and why are they important?

Trust is a valuable commodity in business, especially when establishing relationships with new suppliers. Although legal agreements and references can help, much of the process is based on trust, and that trust can be a wonderful way in for hackers and cyber criminals. When your organisation starts trading with a new supplier, there is an interim period in which relationships  and methods of working established and this is when both organisations are very vulnerable to attack. Once both parties have…

Read More

How to avoid cyber-security incidents

IXCG deals with a large number of malware, virus and cybersecurity incidents every year and, in 90% of cases, a lack of basic planning means that a minor outbreak becomes a major, and very expensive, incident. With prevention costing roughly 5-10% of the cost of an incident, why are so many businesses getting it so wrong? The most common factors with incidents are that the affected organisations either believed that they wouldn’t be a target, or that someone else in…

Read More

Why small and medium businesses are hackers’ favoured targets

Why small and medium businesses are hackers’ favoured targets According to Watchguard Technologies (a leading Internet security vendor), a staggering 80% of small and medium businesses believe that they’re too small to be of interest to hackers. However, their research shows that it is exactly these companies which are hackers’ favourite targets. But why? A false sense of security leads to an easy target As many small businesses don’t think of themselves as a target, they don’t bother to take…

Read More

Inventory management – Knowing what you have is fundamental to security

When we talk to IT managers, security professionals and directors, one of the first questions we ask is “How many systems do you have to secure?”. It’s a simple question, but one which rarely has a simple answer. The typical reply tends to start with the word “About” and therein lies the problem; you can’t effectively manage and secure what you don’t know you have! Depending on the industry your organisation works in, you will typically be covered by several items…

Read More
Latest Tweets
The US Coast Guard warns that commercial vessels are falling vulnerable to phishing campaigns and run-of-the-mill m… https://t.co/z4bPdmhkl520 hours
You should always secure tablets from physical theft, if they are in publicly accessible locations, especially if t… https://t.co/RLwxRA9hkd23 hours
When choosing a Wi-Fi solution, simply offering consumer-grade Wi-Fi fails to provide the performance or security t… https://t.co/UGOgCkDqbP1 day
Is FaceApp a Russian-backed ploy to fuel a facial recognition database, or just another fad with questionable terms… https://t.co/vRr6I81Ea92 days
It takes 5 minutes or less to protect your Cloud applications from hackers with AuthPoint MFA from WatchGuard. See… https://t.co/r9P0gjkLYU2 days