Resources

Guide

Securing Government Data

Government agencies need to stay on top of the latest cyber threats and understanding the data that flows in, out, out and even within the organization. This guide takes a look at how the data travels and the solutions for keeping the data protected where ever it flows.
Blog

September Was Insider Threat Awareness Month

Insider threats may not get as much attention as the outsider threats. Outsider threats are overwhelmingly malicious in intent. Organizations must protect their data with a strong barrier, because the “bad guys” are on the outside. However, inside the walls of an organization can be a disgruntled employee wanting to cause harm or an employee incentivized from outside the organization. Then of...
Blog

Photo Security: Why a Picture Is Worth a Thousand Files

Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Blog

Data Privacy Day - Education and Inspiration

Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?