Resources

Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Press Release

The Ticking Time Bomb: 40% of Firms Expect an Insider Data Breach in the Next 12 Months

As enterprises become larger, managing employee behaviour becomes harder and the risk of a breach occurring within an organisation intensifies. Companies are aware the threat looms large, with 40% of firms expecting a data breach in the next 12 months, as a result of employee behaviour and employees indicating widespread lack of awareness of good cyber security practice.