Go back

29 July 2021 Bryan Littlefair

How Bring Your Own Device Became Bring Your Own Risk Overnight

Smart Phone Device with Human Element Blue Node

For security leaders, change is constant. We are constantly having to adapt our security strategies and activities so that they remain relevant to the business and risk environments that we operate within. However, the past year has seen an unprecedented level of change, driven by the global pandemic.

We talk about the ‘health’ of a system and how that can be impacted by a ‘Virus’ outbreak.

Security leaders watched the issues unfold and as Covid-19 spread across the world, certain geographies took drastic measures to maintain business operations. Sound familiar? That’s because there are direct comparisons to dealing with aspects of viruses in the physical world and dealing with digital threats in the virtual world.

Get the Measure

  • 20 September 2021 Kurt Haller

    What is Ransomware?

    Ransomware is a type of malware attack characterized by holding device control--and therefore locally stored data--for a ransom, which victims typically pay...

  • 17 September 2021 Kurt Haller

    Who is at the Heart of Cybersecurity?

    People are at the heart of cyber security...to protect their finances, their jobs, their identities, and sometimes even their physical safety. People can...

  • 15 September 2021 Kurt Haller

    Hacked a £4.8 billion-pound Company to Impress Friends?

    In 2016, a 17-year-old boy admitted that he had a desire to show off his IT skills to his friends. This led him to use hacking software (SQL Map) to scan...

View more

You Don’t Know What You Don’t Know

Today’s controls on your enterprise network are no longer fit for purpose. Cybercriminals now use encryption as their primary method of communication.

Defend your business effectively, know what is on your network.

See it in Action