Hospital are vulnerable to cyber threats as doctors and nurses are busy and often miss visible phishing links and cues. Learn how SSS helped healthAlliance better manage its risk by training its staff to successfully identify phishing emails. […]
The need for visibility and the ability to find and track “rogue” and “unmanaged” certificates across platforms is paramount. Without visibility, it is impossible to control risks associated with costly outages, customer distrust, or losses from data breach. Discover how we can help your organisation get visibility of certificates issued across your organisation using our […]
We go through the options available for better certificate management and provide recommendations on how to keep up with certificate renewals and avoid outages caused by unexpected certificate expirations. […]
A quick guide to help you evaluate, migrate, and integrate your SSL/TLS certificates requirements with a new CA. […]
See how SSS helped the Ministry of Business, Innovation and Employment solve two issues: Email classification and rationalising mobile device environments. […]
Read More… from Marking emails at source with a security classification
C-RMaaS empowers you with the platform and expertise required to help manage your cybersecurity risks and control compliance lifecycles. By having a single repository for your risk and compliance information you can more efficiently track risks to your IT assets, control assessment information, undertake compliance activities and better understand changes to your risks if any […]
With the rise of ransomware, Taranaki Regional Council wanted a solution that would protect the council from macro threats. SSS Installed StripIT a software solution developed in-house that automatically removes macros from office documents in all emails from external sources before reaching recipients’ endpoint security issues. […]
Read More… from Securing email by stripping macros from attachments
Read more on how SSS helped USL’s solve its IT security concerns, through the implementation of a solution that monitored port access of devices used across the business which included web filtering to address productivity concerns. […]