2|SEC Cyber Security Blog

The Cyber Sentinel

Stay on top of the latest news and updates to stay ahead of the latest threats

security data breaches

The Hacking Attack Golden Hour: Why do UK businesses need to react to threats within 60 minutes?

A recent report written by Enterprise Strategy Group (and commissioned by Intel Security), reveals slow responses to cyber-attacks from UK enterprises are leaving companies vulnerable to targeted online crime. This research is one of the latest attempts to persuade IT users to check their defences against cyber-threats and equally importantly to make some investments into dealing with

The Hacking Attack Golden Hour: Why do UK businesses need to react to threats within 60 minutes? Read More »

Apply Internal Security Rules to Third Parties – Tim Holman writing for ComputerWeekly.com

The best way to expand identity and access management (IAM) to third-party service providers is to treat a third party like an extension of your own company. All staff working for a third-party service provider, who have access to your systems or data, should have a unique user account and password. They should adhere to

Apply Internal Security Rules to Third Parties – Tim Holman writing for ComputerWeekly.com Read More »

Scroll to Top