Tools & security tips: How to leverage the full potential of data
Data is an invaluable asset that a company has. Day in and day out, we witness attacks on big brands where important data is...
Insider threat – Types, impacts and countermeasures
An insider threat is a potential for someone who has or has had authorized access to an organization's assets to act in a way...
8 creative uses of robots during the pandemic
According to World Health Organization (WHO), more than 600 million people were affected, and almost six million died due to COVID-19.
Due to health and...
How cyber insurance helps to confront a ransomware attack
Insurance is crucial in helping businesses deal with ransomware-related losses, such as privacy/data breaches, business interruption, data and system recovery, forensics, and legal support.
Cyber...
Risks of engaging a Managed Security Service Provider (MSSP)
Managed Security Service Providers (MSSPs) may be better qualified to manage security services. Yet, they might not be as successful in implementing solutions tailored...
5 great health and fitness apps for senior citizens
Are you feeling a little “out of sorts”? You’re not particularly feeling unwell or unhealthy, but maybe you feel a little more tired and...
The recent history of ransomware attacks
The story of ransomware is the story of discovery, professionalization, and growth of the targeted attack extortion model. Before 2016 saw a significant increase...
How to evaluate a managed security service provider (MSSP)
In today’s digitalized world, companies of all types and sizes need to protect their critical data assets against breaches and intrusions. Unfortunately, most don’t...
Benefits of managed security service providers (MSSP)
When delegating information security responsibilities and operations, outsourcing specific managed security services (MSS) through a partnership with a managed security service provider (MSSP) is...
Managed security service provider (MSSP) vs. managed service provider (MSP)
Businesses are increasingly dependent on third-party service providers for mission-critical services. This may include services related to managed IT services, SaaS, finance and accounting,...
What should your cyber insurance policy cover?
Cyber insurance is an emerging class of insurance products designed to mitigate losses from various cyber incidents, including data breaches, business interruptions, and network...
Document automation – The key to digital transformation
Documents preserve data, knowledge, and information required for effective business operations that benefit stakeholders (Glushko & McGrath 2008). However, the manual process of creating...

















