Do the old rules still apply?
16 April 2025
Conducting a review of firewall rules and logs helps to ensure an organisation is maintaining a secure, efficient, and compliant network that provides protection against evolving threats and minimises the risk of unauthorised access or disruptions. It is not uncommon for outdated or unnecessary firewall rules to accumulate, increasing administratio…
Read More
Developing a Cybersecurity Strategy - Key Considerations
19 March 2025
Every organisation faces cybersecurity threats, but the specific risks, challenges, and solutions vary. There is no universal approach - each organisation must build a cybersecurity strategy that aligns with its structure, industry, and goals. A well-designed strategy not only protects against threats but also ensures cybersecurity investments supp…
Read More
Is it a policy, process or procedure?
20 February 2025
Policies, processes, and procedures are distinct yet interconnected components of organisational governance, due to a number of factors confusion often arises over what constitutes a policy, process and procedure. Policies set the overarching principles and guidelines that shape decision-making and actions within an organisation, as well as providi…
Read More
Building resilience through vulnerability management
16 January 2025
Vulnerability management is not just a technical or compliance issue, it plays a strategic part in an organisation’s long-term success. A strong vulnerability management program ensures that an organisation’s operations, products, and services are not compromised, enabling it to maintain customer trust, a competitive edge and brand integrity. In sh…
Read More