ramsac team

IT Blog Category: Cybersecurity

Maintaining system resilience in a technological world

Maintaining system resilience in a technological world: What the CrowdStrike outage can teach us

Cybersecurity

The CrowdStrike outage on the 19th July caused worldwide chaos from airlines to hospitals and everything in between. What can we learn from this? We discuss. [...]

ramsac team

What is data theft and how do you prevent it?

Cybersecurity

In any size organisation, data theft can be a huge issue. From disgruntled employees to large scale cyberattacks, data theft can severely impact your business. According to a report [...]

The true cost of a cyber breach

Cybersecurity

Understanding the true cost of a cyber breach is crucial, as it involves not only the immediate financial losses but also potential long-term impacts such as data loss, business [...]

ramsac team

Inherent risk vs residual risk: What’s the difference?

Cybersecurity

Inherent risk and residual risk are key elements of any effective risk management process designed to strengthen cybersecurity defences and protect your company’s data. Read on. [...]

ramsac team

What is cybersecurity monitoring? How important is it in 2024?

Cybersecurity

Cybersecurity monitoring is the continuous surveillance of digital systems to detect and respond to security threats and data breaches in real-time. Discover how cybersecurity monitoring software can protect your [...]

Examples of sensitive data in your organisation

Cybersecurity

Any confidential information that’s stored, processed, or managed by an organisation or individual is classified as sensitive data. Read our sensitive data examples today. [...]

secure password policy in Microsoft 365

How to set up a secure password policy in Microsoft 365

Cybersecurity

Discover the essentials of a robust password policy for cybersecurity in Microsoft 365. Learn what to include and what to avoid. Read the blog today. [...]

How to apply Labels hero image

A guide to sensitivity labels and how to apply them

Cybersecurity

Sensitivity labels allow you to manage, organise, and protect sensitive emails, files, and documents as part of the Microsoft 365 suite. Read on. [...]

MFA vs 2FA What's the Difference

MFA vs 2FA: What’s the difference?

Cybersecurity

Features like user facial recognition that are difficult to replicate means multi-factor authentication offers more cybersecurity layers than two-factor authentication. Find out more. [...]

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?