Recent Posts / View All Posts

Stay Cyber Safe When You Travel Near and Far

| Business, Resources, Security | No Comments
In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re travelling—whether domestic or international—it is always important to practice safe online...

Network probes – precursor to a breach of your defences?

| Business, News, Security | No Comments
Network probes or the pre-ATT&CK phase (see below*1) are indicators of the silent attacker reconnaissance of the internet. Hidden in these scans can be the first signs of interest which can...

BBC Reports that infrastructure continues to be successfully attacked

| Business, News, Security | No Comments
How to protect key infrastructure Assume attacks will be made. Prepare with the right people, processes and technology, or risk long-term damage Realise the attacks will not stop. Many organisations...

You’ve been hit by ransomware, should you pay?

| Brand, Business, Security | No Comments
Your first reaction when faced with potentially losing all your data in a ransomware attack is possibly to reach for your wallet, but is it the right thing to do?...

Mitigating against DDoS attacks

| Business, Resources, Security | No Comments
DDoS may be an old school attack vector but, it still accounts for 40% of cyber incidents according to Verizon… don’t get caught out! DDoS (distributed denial of service) attacks...

How to build a successful security awareness training program

| Brand, Business, Resources, Security | No Comments
Security awareness training is crucial in the fight against cybercrime, Patrick Hart, CEO, Soteryan, explains getting it right needs more than a check-box mentality… you need to engage your employees!...

Bridging the security resource gap

| Business, News, Resources, Security, Strategy | No Comments
As companies face the challenge of combatting an expanding threat surface with a lack of internal resources, Soteryan’s CEO, Patrick Hart, looks at the role in-house and strategic partners will...

Rushing to the cloud could be undermining your security

| Business, Security, Strategy | No Comments
While shifting to the public cloud has big benefits for companies, Soteryan’s Salim Neino warns that it can also open up a back door to their data and undo the...

Enterprise password management best practice

| Business, Resources, Security | No Comments
Weak or stolen passwords are the first point of entry for 80% of breaches, so it’s critical enterprises get a handle on their password management. Building an effective password policy...

All the phacts about phishing

| Business, Resources, Security | No Comments
Phishing is the single most common way for malware to be delivered into your network. Here are four things you need to know to protect yourself. Wikipedia defines phishing as...

Legislation could be the next big cyber threat to your brand

| Brand, Business, Security | No Comments
While ransomware looks set to be with us for the long haul, data protection legislation could prove an even bigger threat to organisations, says Soteryan’s Salim Neino. In cybersecurity, the...

Understanding and mitigating against drive-by-downloads

| Business, Security | No Comments
Drive-by-downloads are some of the most dangerous forms of attack as they can creep in under the radar without users noticing they’ve been infected. Here’s how you can protect yourself....

What is Cryptomining and why should you take notice

| Business, Security | No Comments
Cryptomining witnessed a huge rise this past year. While it may appear much less damaging than other attacks, it can be just as dangerous, so you can’t afford to overlook...

Understanding risk is crucial to enterprise patch management

| Business, Resources, Security | No Comments
It isn't news that many enterprises are not effectively managing their patch management programs, but here are three things that can help you refine your own position. Despite what you read...

Emotet: the dangerous infection you may not know you have

| Business, Security | No Comments
You may not have heard about it, but Emotet malware is set to become a major threat in 2019. Here’s what you need to know to help defend yourself. Though...

Five pillars to build your cybersecurity on

| Business, Security, Strategy | No Comments
Soteryan’s Salim Neino sets out the five key building blocks that companies need to focus on in order to create a solid cyber security strategy.  Maintaining a solid cyber defence...

GDPR in a Nutshell

| Brand, Business, Security | No Comments
At a glance GDPR key pointers, what you need to consider The GDPR requires organisations to have appropriate measures in place to protect personal data, which could include: Documenting what...

2018 Winter Olympics hit by cyberattack

| Business, Security | No Comments

Main web site down for a total of about 12 hours

100 days to GDPR compliance deadline

| Business, Resources | No Comments

The rise of the Data Protection Officer & GDPR

Here To Support Your Security Needs

Take Action Now To Secure Your Digital Assets

Contact UsContact Us