Eskenzi PR ad banner Eskenzi PR ad banner

Insight

Author headshot

It comes as no surprise that the Covid-19 pandemic has resulted in an increase in security gaps. The global crisis revealed a multitude of nascent cyber-security shortcomings, including a lack of agility to support homeworking and an overreliance on on-premise security. It also created a whole host of new challenges, from scam Covid-related domains to an increase in phishing attacks. Indeed, the pandemic has seen cyber-crime flourish. In its Annual Review 2020, the UK’s NCSC...

Read more
Author headshot

Passwords are the first line of defense when it comes to digital security. For most businesses, each employee is going to have at least one username and password that they need to remember. In many cases, there will be many. This is, of course, is in addition to all of their personal accounts and passwords which are sometimes used on the same device as their work accounts.   With this in mind, it should come as no surprise that somewhere between 20% and 50% of calls...

Read more
Access Control: The 5 Single Sign-On Benefits

In March 2020, many people began working from home due to the COVID-19 pandemic.  The email to your teammates stating that you were “working from home” instantly had new meaning. Working from home resulted in additional risk management and security challenges for employees, executive leadership, and information technology (IT) teams.  Organizations that had not embarked upon the journey that is IT Modernization or that had not implemented identity and access management (IAM) struggled with business...

Read more
Author headshot

What is an IT Health Check (ITHC) An ITHC (IT Health Check) is a series of tests to ensure that your organisation is impenetrable to unauthorised persons. Specifically, organisations or individuals conduct an ITHC to confirm that they meet key requirements for PSN compliance. Direct from the ITHC supporting guidance: “Your ITHC should aim to provide assurance that your organisation’s external systems are protected from unauthorised access or change, and they do not provide an unauthorised entry...

Read more
The Legacy of Security Champions

What will the legacy of security leaders be in the years to come? Will they be remembered as the defenders of the cyber realm, heroes or will history view them as annoying barriers who did nothing but slow down innovation? Many security leaders agree that too many times, the security team is viewed as the Department of No. Now, some may believe that the end justifies the means. Every third party needs to be audited...

Read more
Business security remains resilient in the wake of coronavirus

The coronavirus pandemic has put cybersecurity under a renewed spotlight. New ways of working and a fragmented workforce has challenged CISOs and their security teams; as the threat landscape has grown, nefarious actors have jumped at the chance to exploit the ever-fluid situation. We have seen attacks grow in frequency and sophistication; Telstra’s Agility Report, which surveyed 500 senior IT and business decision makers across Europe was released earlier this year, and revealed that over...

Read more
Author headshot

As one of the unfortunate benefactors from the changing business behaviours of the pandemic, ransomware attack trends continue to evolve. During the last year, malicious actors have attacked anything from healthcare organisations and medical trials, to education and the public sector, and even business supply chains. The gravity of the threats of ransomware was exemplified by the attack that shut down the cross-country gas pipeline system Colonial Pipeline; the largest U.S. fuel pipeline, leading to...

Read more
Reinventing Asset Management for Cybersecurity Professionals

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see. But that comprehensive view needs to be specific to the security team, which has a different role than IT teams concerned with inventory, software support and license oversight. Security teams that rely on asset inventory from their IT counterparts are challenged by a...

Read more
Author headshot

Almost every day, no matter where we go or what we do, we often have to provide proof that we are who we say we are. This can be when you open up a bank account, collect a parcel from the post office, or when you make certain purchases. What all these situations have in common is that we, as citizens, currently have to produce physical documents, whether it is a passport or driver’s license,...

Read more
Author headshot

With the steady stream of recent ransomware headlines from Colonial Pipeline to the Irish Health Service, it is clear that attempts to stem the wave of successful attacks are not working.  The worry of waking up to a ransom message is what keeps many IT security managers and their bosses awake at night. For cybercriminals, ransomware is a low-risk, high reward activity, with a virtually unlimited supply of potential victims. To make matters worse, the...

Read more
Page 14 of 22 1 13 14 15 22