Cyber-Security vs Cyber-Resilience

While the difference between cyber-security and cyber-resilience might not be obvious to some, the implications of failing to address both are significant. In simple terms, cyber-security describes an organization’s ability to protect themselves from security threats, such as malware, phishing, DDoS, SQL injection and insider threats. Cyber-resilience, on the other hand, focuses more on … [Read more...]

How to Make Your Security Budget Go Further: Stop Responding and Start Preventing

At Lepide, I chat with quite a lot of customers, and there is a common sentiment that comes up; “we need a bigger security budget.” I think everyone would agree that addressing the security problems of today requires the allocation of a sensible budget. However, I think that the main challenge is not the amount of money being spent, it is spending that available budget on the right things and … [Read more...]

On-Premise vs Cloud Data Storage: Pros and Cons

Even before the current health crisis began to unfold, many executives and IT personnel have been debating about the practicalities and implications of storing and processing sensitive data in the cloud. Using cloud services for the storage and processing of valuable data is understandably tempting, as it allows organizations to eliminate numerous costs and responsibilities. There are, however, … [Read more...]

What is Emotet Malware and How Do You Defend Against it?

Emotet is a form of banking malware that was first discovered in 2014. Like many other forms of malware, its main objective is to extract sensitive information from the victim’s computer. However, unlike other forms of malware, Emotet is able to evade most anti-virus products. Hewlett-Packard reported a 1200% increase in the number of attacks using the Emotet Trojan, supporting a surge in … [Read more...]

Is Your Data Secure in Office 365?

It is completely understandable why organizations are concerned about the security implications of storing large amounts of valuable data in the cloud. After all, they have no direct control over the policies, procedures and technologies that are used to safeguard their data from malicious actors, which includes safeguarding the data from the service provider’s own employees. However, it is … [Read more...]

Data Security Risk Assessment Checklist

Carrying out regular data security risk assessments is vital to establishing current security gaps and recommending remediations for breach prevention. Many compliance regulations mandate risk assessments as part of a comprehensive security strategy. What is a Data Security Risk Assessment? Data risk assessments can be broken down into three fundamental steps. First, identifying what the risks are … [Read more...]

Microsoft Teams Security, Tips and Best Practices

Remote working and COVID-19 have accelerated the use of Microsoft Teams over the last 12 months. As a collaboration and sharing platform, MS Teams has been a savior to many remote working teams. However, not unlike other collaboration and sharing platforms, MS Teams does have a number of security vulnerabilities that security and IT teams need to understand and address. In this blog, we will go … [Read more...]

Google Drive for Business Security Best Practices

Google Drive has become an invaluable data storage facility for many organizations, as it enables employees to collaborate on projects, regardless of where they are located in the world. Is Google Drive Safe for Business? Of course, Google takes security very seriously, however, as with any cloud service provider, there are inherent risks that you need to be aware of. The most obvious risk being … [Read more...]

What is a Cybersecurity Assessment?

A cybersecurity assessment is a review of your current security controls to see how well they stack up against either known potential security threats or the threats you have directly encountered. The assessment will also evaluate whether you are adequately satisfying the relevant regulatory compliance requirements. While there is no fixed method for carrying out a formal risk assessment, the most … [Read more...]

Best Practices for a Cybersecurity Audit

Cybersecurity audits help organizations establish whether their current cybersecurity practices, policies and tools are up to the task of keeping their data and systems secure. However, cybersecurity audits can be tricky to do on a regular basis when you aren’t sure exactly what to look for. In this blog, I will go through some best practices for your cybersecurity and internal audit to give you … [Read more...]