Secure Video Conferencing: Expectations Vs Reality

With the COVID-19 pandemic spreading around the world, millions of individuals have been sent home by their companies to begin remote working, many for the first time.   Remote working is an excellent option at a time like this given the amount of access we now have to each other through the use of technology. […]

Secure Video Conferencing: Expectations Vs Reality Read More »

How well do you know the insider threat? Start the quiz to find out!

How well do you know the insider threat? Current or former staff, contractors, suppliers, or a trusted business partner, who has or has had authorised access to the organisation’s assets can cause major security problems that threaten a company’s brand and reputation. Measure your knowledge of stolen secrets, data breaches espionage, fraud and network sabotage.

How well do you know the insider threat? Start the quiz to find out! Read More »

Protecting businesses from insider threats with machine learning

Employing user behaviour analytics to detect internal threats. Machine learning and AI are the latest tools being utilised by businesses to help prevent cybercrime and stop cyberattacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who

Protecting businesses from insider threats with machine learning Read More »

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself

Our CommuniCloud Managing Director, Glenn Makowski, was invited to share his knowledge at the 2019 Olive Conference and Trade Exhibition at Albury Entertainment Centre.   Taking place over the 17th to 19th of October, the industry event allowed Glenn to put forward the goings on at CommuniCloud, where we have begun to include cyber-security options as

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself Read More »

Free 30 minutes ISO 27001 Essentials Webinar

Implementing an ISO27001 compliant Information Security Management System (ISMS) can be an intimidating task, especially if one has no prior knowledge of the Standard. An ISMS is a systematic approach to managing risks related to valuable information assets (organisation information) to ensure it remains secure. This approach includes people, processes and systems. An ISMS preserves the confidentiality,

Free 30 minutes ISO 27001 Essentials Webinar Read More »

The Threat of Spear Phishing: How to prevent attacks

Cybercriminals used to rely on broad spam attacks with limited success. Unfortunately, times have changed. Today, highly-targeted email phishing schemes are penetrating the IT systems of major organisations around the world, leading to massive data hacks and security breaches. If it feels like high-profile cyber crimes are in the news every day, it’s because they

The Threat of Spear Phishing: How to prevent attacks Read More »