
IT Blog Category: Cybersecurity

How secure is MFA based on SMS and voice calls?
In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]

Microsoft Office – High Severity Vulnerability
Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]

EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring
The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]

Introducing Secure+ from ramsac: Keeping a watchful eye on your IT estate
We are thrilled to be launching secure+ our most significant product launch in over a decade. Secure+ is a proactive cybersecurity monitoring service designed to keep a watchful eye [...]

Ask the expert: answering the internet’s most common Phishing questions
Phishing attacks are a huge risk for organisations in this blog our lead cybersecurity consultant answers the most common questions we get about phishing. [...]

What is cyber insurance and do you really need it?
Cyber insurance can mitigate a business against damages and financial loss caused by a cyberattack. But what does cyber insurance cover? Find out here. [...]

The importance of supply chain cybersecurity and risk management
Supply chains are areas of increasing cybersecurity risk. What is the exact problem, and how can you address it? Discover this and more in our latest blog. [...]

The worst cybersecurity attacks from 2022
If 2022 has taught businesses anything, it’s that cybersecurity attacks, breaches and leaked data are incredibly costly. Here are some of the worst attacks from 2022. [...]

Over $200 million lost to cyberattacks in 2022 alone, study shows
ramsac can now reveal which 25 of the world’s largest public companies listed in Forbes Global 2000 could suffer the biggest financial loss due to cyberattacks, based on 12 [...]