Phishing scam

How to Protect Yourself from Email Fraud

Email Fraud is a deceitful cyber-security attack sent from another person or organisation with the malicious intent of a personal gain or the cause of disruption to a business or individual. Some scams portray themselves as colleagues within a business, whilst others promise to be unmissable special offers; the likelihood is that everyone has received at least one fraud or ‘Phishing’ Email.

Continue reading

Cloud Adoption Framework

ENISA Publishes Security Framework for Public Cloud Adoption in Europe

The evolution of global standardization bodies and government policy is paving the way for businesses and government agencies benefit from the use of the cloud. Each region of the world adopts different approaches to policy development, formulation of guidelines and best practices for using cloud safely within the limits of their respective laws and slightly cultures practice.

Continue reading

Health Check

Security Health Check:Friend or Foe?

When was the last time that you did a Security or a Nework Assessment? The amount of projects rolled-out over the years, the number of changes required to make all new applications to work, new opened branches, in and out of corporate users, new servers spinned up/down, and IoT just to mention some. To make it more challenging, your infrastructure is possibly spread across 2+ Datacenters and you are adopting an Hybrid-Cloud approach , which pose more security risk due the number of entrance points from the outside world.

Continue reading

Cisco Anyconnect

How To Find a Cisco Anyconnect Profile

Your Cisco Anyconnect profile is stored locally to your computer and contains the XML and other profile data. However, they are not obvious to find because of the way in which different operating systems are presented, in addition if you deal with different Operating Systems everyday it can be frustrating to keep up with which exact location these profiles are installed within.

Continue reading