IT Blog Category: Cybersecurity
The importance of effective supplier data security
In this blog post, we will explore essential considerations and questions to ask your suppliers about the protocols they have in place that keep you, and any shared data, [...]
What is Mobile Device Management?
Mobile Device Management is a type of software used by organisations to monitor, manage and secure employees’ mobile devices. In this blog we explain how to build a strong [...]
10 steps an organisation can take to mitigate cybersecurity risks
This blog post outlines 10 steps that an organisation can take to reduce its cybersecurity risks and enhance its resilience and recovery capabilities in case of a cyber incident. [...]
MOVEit & Zellis data security attack puts thousands of employees at risk
The recent Zellis data breach exposed thousands of employees’ personal data to hackers using a zero-day flaw in MOVEit software, in this blog we give our top 5 tips [...]
Understanding the dangers of ‘Permission Creep’
This blog post explains what permission creep is, how it can expose sensitive data to unauthorised users, and what steps an organisation can take to prevent permission creep. [...]
Using cybersecurity training to reduce an organisation’s risk of a cyberattack.
Cybersecurity training is an important tool for organisations to prevent and mitigate cyberattacks, we explore the types of training available to organisations. [...]
The security risks of ChatGPT: how to stay safe with AI models
Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]
How secure is MFA based on SMS and voice calls?
In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]
Microsoft Office – High Severity Vulnerability
Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]