Procedures & Controls
Leaver / Off-boarding Checklist
Process Checklist Off-boarding/Leavers When an employee leaves the company, you'll need to remove them from all information technology assets. Before ...
Effective steps to cyber exercise creation
Organizations need to be able to detect and respond quickly and effectively to a cyber incident to reduce the financial, operational and reputation ...
Phishing attacks: defending your organization
Phishing attacks: defending your organization provides a multi-layered set of mitigations to improve your organization ’s resilience against phish...
Phishing Simulation Campaigns
Phishing has become one of the most talked about threats in cyber security and so, quite rightly, organizations want to protect themselves against it....
Protect your management interfaces
When it comes to architecture design, one area that is often not given due consideration is the protection of the management interfaces used by admini...