The European Cyber Security Awareness month is an annual campaign dedicated to promoting cybersecurity among citizens and organisations throughout the European Union. The campaign which takes place for the entire month of October every year since it's first event in 2012, has been providing up-to-date security information through awareness raising and sharing of good practices, with many activities such as webinars and trainings taking place.
Cyber security can seem overwhelming to many. When you hear statistics that thousands of new types of malicious software are reported each year, it is not hard to imagine the impact a virus or a computer compromise can have on our networks and the information contained within those systems. To read more click here.
Malware is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. To read more click here.
An Internet Acceptable Use policy tells you how you may use the company’s Internet facilities, it outlines your personal responsibilities and informs what you must and must not do. To read more click here.
Information security can take many forms; including: 1. Hard copy data held on paper, 2. Data stored electronically in computer systems, also known as Data at Rest and 3. Data stored using electronic media such as USB drives, disks and tapes, otherwise known as Data in Use. To read more click here.
Device security occurs as devices become smaller and more powerful, the number of tasks that can be achieved away from the office grows. However, with increased capabilities come new risks. Security controls that have evolved to protect the static desktop environment can now be easily bypassed via a smartphone, tablet or notebook laptop outside the confines of an office. To read more click here.
Information and data are extremely valuable as sensitive assets to companies, organisations and individuals, therefore its storage, use and transmission is heavily regulated by the governments around the world. To read more click here.
Principle 6 of the GDPR requires that organisations maintain appropriate security controls around personal data. Furthermore, Article 32 of the GDPR stipulates that a controller and processor “shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate”. To read more click here.
If you would like to hear more about how Sytorus can help your organisation manage Cyber Security threats, click on the link below to speak to a member of our team.