Please consider updating your browser. Some parts of the website may not function as intended.

Webinar: How to Optimise Your Security Penetration Testing

Do you want some practical advice on how to get a better return on your security penetration testing investment? Connect with us to hear our security testing expert, Richard Hollis discuss how you can receive full benefits from your penetration testing. Sign up for the webinar: How to Optimise Your Security Penetration Testing DATE: Thursday, […]

Who’s Zoomin’ Who?

Zoom unsecure

Video conferencing has never been more popular, let’s have a look at the options and examine some of the security implications. Possibly you, like me may have been a bit disappointed to see that when it comes to video conferencing his taskforce, our Prime Minister simply used Zoom like many of the rest of us. […]

Don’t be Vulnerable to Vishing – Identify and Mitigate Risk

Vishing

In this post, you’ll learn why vishing is successful and what you can do to mitigate the risk of being vished. Vishing is a form of social engineering. Much like phishing, it can be used to manipulate people into giving away usernames, passwords and sometimes bank details. Vishing: Exploitation by voice commands Vishing is the […]

What’s a Mature Security Awareness Programme?

Security Awareness Programme

Good news. Bad news. The bad news is that cyber security threats to businesses are increasing exponentially every day. But then, you already knew that. The good news is that the best defence against these ever-growing threats is already at work in your business – your staff. In 2019, 60% of the breaches that occurred […]

Why Information Security Awareness Training is Important

a young male using the eRiskology Information Security Awareness elearning portal

Good information security awareness training can turn your workforce into the strongest line of defence instead of the ‘weakest link’.  Around 70 – 80% of all breaches can be attributed to the human element, yet companies often focus their resource of software-based security solutions. Where do we start? If you haven’t already found our post […]

Do NOT follow this link or you will be banned from the site!