Try for Free
Demo Centre

Complying with HIPAA: A Beginner's Guide

The Health Insurance Portability and Accountability Act, or HIPAA, is a data protection regulation for digitally stored healthcare data. Any company that deals with private health information must ensure they are HIPAA Compliant. 

Read more

How to Reduce The Risk Of Human Error Cyber Attacks Remotely

As we move towards an era of an increasingly remote workforce, we need to ensure that users human error risk is reduced as much as possible. Cybercrime has increased since the pandemic, in part, it's suspected due to the remote workforce being a target due to their isolation from typical security defences. This blog discusses how to reduce the risk of human error with a remote workforce. 

Read more

Cyber-Security Awareness Month: Free Resources

This year we’re offering free resources to help spread the word about cyber risk, and the “Do your part, be cyber-smart” campaign. It’s all about making sure everyone is involved in cybersecurity efforts, companies, governments and individuals.

Read more

Choosing a Security Awareness Program That Fits With Remote Working

As many businesses begin to settle in to the new reality of remote working, they need a security awareness program that suits these new needs. In this blog, we'll look at what makes security awareness training effective from home.  

Read more

Cyber Security Awareness Month

It's that time of year again, so we've put together four of the most common user-targeted security threats to look out for.

Read more

9 Reasons Why Security Awareness Training is a Top MSP Investment

Cyber breaches can be expensive for MSPs. Re-installing operating systems, restoring data from backups and wasting hours on support are all costs that no MSP wants to deal with. Here's how to save money and time by enrolling your clients onto an SAT programme. 

Read more

PCI DSS Training: What You Need To Know

Every single business that takes credit card payments must be compliant to the Payment Card Industry Data Security Standard (PCI DSS). But what exactly is it? In this blog we take a deep dive into what PCI DSS is, and how to become compliant.

Read more

ISO 27001: Achieving International Information Security Compliance

Gaining ISO 27001 compliance, and even certification can be a long and potentially arduous process. Once done, however, it's proof that all your main cyber-security bases are covered, which will help both protect your company and give you added legitimacy over the competition. Is the journey for ISO 20071 certification right for you?

Read more

Free Policy Template Pack!

We've put together a free policy pack with some of our most used policy templates that you can adopt in your business. Just click the download link below and get the following 5 most commonly used policy templates, totally free!

Read more

Spear Phishing Training: Implementing a Course

Spear-Phishing can be the most effective way that hackers and scammers attack your business. In one study, 50% of users clicked the link in a spear-phishing email. So how can you educate your employees on spear phishes, and most importantly prevent them.

Read more

Your Complete Guide To Phishing

We've all heard of them by now, but do your end-users really know how to spot a phishing scam? Here, we look at the different types of attacks and employee phishing awareness training.

Read more

Why Policy Management Helps Your Companies Cyber-Security Program

 
A lot of people ask how policy and cyber security are related to one another. In this blog post we’ll look at showing how these inter-related topics can support each other for robust risk management
 
Read more

Example Of An Email Policy And Why it is Important to Cyber-Security

In this article we will define an email policy, the potential positive's and negative's and explain how to implement an effective email policy within your business. Implementing an an email policy for your employees can be an effective way to ensure good practice. 

Read more