IT Blog Category: Cybersecurity
Understanding the dangers of ‘Permission Creep’
This blog post explains what permission creep is, how it can expose sensitive data to unauthorised users, and what steps an organisation can take to prevent permission creep. [...]
Using cybersecurity training to reduce an organisation’s risk of a cyberattack.
Cybersecurity training is an important tool for organisations to prevent and mitigate cyberattacks, we explore the types of training available to organisations. [...]
The security risks of ChatGPT: how to stay safe with AI models
Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]
How secure is MFA based on SMS and voice calls?
In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]
Microsoft Office – High Severity Vulnerability
Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]
EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring
The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]
Introducing Secure+ from ramsac: Keeping a watchful eye on your IT estate
We are thrilled to be launching secure+ our most significant product launch in over a decade. Secure+ is a proactive cybersecurity monitoring service designed to keep a watchful eye [...]
Ask the expert: answering the internet’s most common Phishing questions
Phishing attacks are a huge risk for organisations in this blog our lead cybersecurity consultant answers the most common questions we get about phishing. [...]
What is cyber insurance and do you really need it?
Cyber insurance can mitigate a business against damages and financial loss caused by a cyberattack. But what does cyber insurance cover? Find out here. [...]