You can now see updated details of our Vulnerability Management as a Service on our website. This service is designed to make it easier for you to protect your organisation and to save you time so you can focus on your other priorities. Vulnerability assessment and remediation is one of the most important cybersecurity activities to help […]
Read More… from SSS VMaaS – making it easier for you to protect your organisation
SSS and Thycotic are offering you a free copy of Cybersecurity for Dummies. This free ebook describes what everyone needs to know to defend themselves and their organisation against cyber attacks. It offers simple steps everyone can take to protect themselves at work and at home. The Cybersecurity for Dummies ebook explains in simple terms: […]
Read More… from A free gift – brought to you by SSS and Thycotic
Sophos recently announced a completely new approach to endpoint security that will detect both known and unknown malware without relying on signatures. With the increase in volume and complexity of endpoint attacks, security is often reactive and too slow. SophosLabs analyses over 400,000 new malware samples every day and found that 75% of malware is […]
Read More… from Harness the power of deep learning with Sophos Intercept X
We are happy to announce that SSS has been selected as one of the suppliers for the new All of Government ICT Security and Related Services Panel (SRS Panel). The SRS Panel is made up of an approved group of industry experts who have been selected to provide government agencies with ICT security services and […]
Read More… from SSS appointed to the new All of Government ICT Security and Related Services Panel
Certificates. What are certificates? Why use them? A Certificate is a digitally signed statement. It is commonly used for authentication and to secure information on open networks. The scope for which certificates are being used is expanding to devices, people and things. However, certificates don’t last forever, they are not a ’set and forget’ technology. […]
As more and more people and organisations adopt cloud services, Cloud Access Security Brokers (CASBs) have become a must-have for the information security team to help monitor activity and enforce security policies. CASBs provide critical capabilities such as governing access and activities in sanctioned and unsanctioned cloud services, securing sensitive data and preventing its loss. […]
Read More… from CASB use cases – for better visibility and control of your cloud-based services
SSS is pleased to announce that we have become trusted partners with Netskope. Netskope is a leader in cloud security and provide solutions to help you understand activities, protect data and data loss prevention, stop threats and respond to incidents. Netskope offers the highest ranked Cloud Access Security Broker (CASB) in the Forbes Cloud 100, […]
Every day thousands of people fall victim to phishing attacks. A quick glance in my personal email shows three phishing emails that came in today. In one, I have a package that is due to be delivered and I need to check and verify the detail. In another (from what appears to be from my […]
Read More… from Phishing simulation & cyber security training
Recently we have seen several news stories referencing MFA i.e. multi (or second) factor authentication. MFA (or just 2FA) is needed because it is now widely accepted that relying on passwords alone is insufficient to protect sensitive information. We need a second factor (at least) to protect sensitive information. In the early days of 2FA […]