Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in...
Blog

Microsoft's Defender for Identity – Is it Enough?

In early 2023, Microsoft launched Defender for Identity which aims to offer visibility by helping to identify threats and provide actionable reports on attacks. But M365 security is not completely adequate for the modern enterprise and must be augmented by other data security solutions.
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Guide

PCI Compliance Best Practices

While the database issues and solutions are well known, the real challenge is around unstructured data, where credit card information finds its way into email and documents, these are then transferred around and outside the organization creating unnecessary risk.
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Video

How to Enhance Data Loss Prevention in Office 365

In this webinar, Nick Hogg, Director of Technical Training, talks through the data risk challenges with Office 365 and looks at ways you can further protect your critical data and secure your installation from cyber threats.
Video

Manage, Sanitize and Secure Your File Transfers

Join our cybersecurity experts to learn how Fortra can help you mount a triple-defense of managing, sanitizing, and securing your file transfers.
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

Right to be Forgotten Requests: How to Ensure Your Business Doesn’t Grind to Halt

GDPR is the most comprehensive data protection legislation to date and it's revolutionizing the information security landscape. The impending enforcement of the regulation is forcing organizations to understand, and transform, the way they collect, process and store data. One of the most challenging aspects of the legislation is the ‘right to be forgotten’ (RTBF), the ruling...
Blog

Why Access Information?

Blog by Kevin Bailey, Head of Market Strategy. One of the easiest ways to stop attacks on information is to close down the shutters, build impenetrable firewalls, stop all access and return to the world of the chalk and blackboard.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?