Infosec Cloud
Solutions. Services. Training.

The 'chat' from the cloud

Keep up-to-date with the latest trends, hints and tips on cloud-based security

Check your Facebook Privacy Settings

Date: Mar 22, 2018

Category:Blog

Find out how to check and change your privacy settings on Facebook. Great advice from Trusted Reviews: The entire Facebook/Cambridge Analytica affair highlights just how important it is to keep track of the apps you use − or have used […]

Read More

Stop your organisation falling victim to phishing attacks

Date: Mar 19, 2018

Category:Blog

No matter how much is invested in securing IT infrastructure, organisations are only as secure as their end users. Users have the knowledge and access that cyber-criminals need to breach an organisation’s security. And cyber criminals are using more and more […]

Read More

Are your legacy software applications letting hackers in?

Date: Feb 19, 2018

Category:Blog

Guest Post: Chris Lund SecurEnvoy It’s a real challenge for any IT administrator to stay on top of network security against a constantly changing threat landscape. The traditional network edge is now all but non-existent thanks to BYOD, homeworking and […]

Read More

NEW: GDPR Online Readiness Assessment Tool

Date: Jan 15, 2018

Category:Blog

Is your organisation on track to satisfy the requirements of the GDPR? This free GDPR Online Readiness Assessment tool enables you to find out where your biggest compliance gaps are, and helps you to develop a plan to close them. […]

Read More

Fake Meltdown and Spectre Patch Phishing Emails

Date: Jan 10, 2018

Category:Blog

Take note – cyber criminals have already jumped on the ‘Meltdown and Spectre’ bandwagon with patch phishing attacks. You need to take action now. Key points: *  Vendors are quickly rolling out patches. Microsoft and Google did so last Thursday. […]

Read More

Meltdown and Spectre

Date: Jan 8, 2018

Category:Blog

Vulnerabilities in modern computers leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to […]

Read More

Why you need 2018 End User Security Awareness Training

Date: Jan 3, 2018

Category:Blog

When it comes to cyber security, end users are both the prime target and the weakest link in any organisation: * They respond to emails that have been highly personalised * They click on malware-infected links that look legitimate * […]

Read More

GDPR: What is Personal Data?

Date: Dec 4, 2017

Category:Blog

The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union and the European Commission will strengthen and unify data protection for all individuals within the EU. This new regulation comes […]

Read More

Gartner: Redefining Endpoint Protection for 2017 and 2018

Date: Nov 17, 2017

Category:Blog

As outlined in this new analyst report from Gartner, malware, ransomware, zero-day attacks and other malicious attack tools, tactics, and techniques are evolving faster than traditional endpoint protection platforms (EPP). IT, security and risk management professionals need to ensure that […]

Read More

GDPR Key Terms

Date: Nov 15, 2017

Category:Blog

To help you navigate your way to GDPR compliance here’s a handy glossary of key terms: Binding Corporate Rules Personal data protection policies which are adhered to by a controller or processor established on the territory of a Member State, […]

Read More
  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security