Cybersecurity

CommuniCloud Achieves ISO 27001 Certification for Information Security Management

ISO 27001 reinforcing CommuniCloud takes security seriously with our commitment to protecting your data. On 10th September 2020, CommuniCloud officially achieved ISO/IEC 27001 Certification, the international standard on Information Security Management. By attaining this highly regarded standard, CommuniCloud has demonstrated that security is of the utmost importance and forms the core of its business, specifically with the provision of

CommuniCloud Achieves ISO 27001 Certification for Information Security Management Read More »

Cyberattacks on the Rise Alongside Remote Work: Set Your Staff up for Safety and Success

Despite the current global pandemic, a number of instances across the globe have proven that cyber attackers are taking no time off, and are instead taking full advantage of our new, chaotic world. The Czech Republic saw a cyberattack that halted urgent surgeries, while also re-routing patients in a busy hospital fighting COVID-19. A food

Cyberattacks on the Rise Alongside Remote Work: Set Your Staff up for Safety and Success Read More »

How well do you know the insider threat? Start the quiz to find out!

How well do you know the insider threat? Current or former staff, contractors, suppliers, or a trusted business partner, who has or has had authorised access to the organisation’s assets can cause major security problems that threaten a company’s brand and reputation. Measure your knowledge of stolen secrets, data breaches espionage, fraud and network sabotage.

How well do you know the insider threat? Start the quiz to find out! Read More »

Protecting businesses from insider threats with machine learning

Employing user behaviour analytics to detect internal threats. Machine learning and AI are the latest tools being utilised by businesses to help prevent cybercrime and stop cyberattacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who

Protecting businesses from insider threats with machine learning Read More »

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself

Our CommuniCloud Managing Director, Glenn Makowski, was invited to share his knowledge at the 2019 Olive Conference and Trade Exhibition at Albury Entertainment Centre.   Taking place over the 17th to 19th of October, the industry event allowed Glenn to put forward the goings on at CommuniCloud, where we have begun to include cyber-security options as

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself Read More »

Free 30 minutes ISO 27001 Essentials Webinar

Implementing an ISO27001 compliant Information Security Management System (ISMS) can be an intimidating task, especially if one has no prior knowledge of the Standard. An ISMS is a systematic approach to managing risks related to valuable information assets (organisation information) to ensure it remains secure. This approach includes people, processes and systems. An ISMS preserves the confidentiality,

Free 30 minutes ISO 27001 Essentials Webinar Read More »

The Threat of Spear Phishing: How to prevent attacks

Cybercriminals used to rely on broad spam attacks with limited success. Unfortunately, times have changed. Today, highly-targeted email phishing schemes are penetrating the IT systems of major organisations around the world, leading to massive data hacks and security breaches. If it feels like high-profile cyber crimes are in the news every day, it’s because they

The Threat of Spear Phishing: How to prevent attacks Read More »

How cyber threat intelligence sharing can benefit the government sector

Cybercriminals operate at incredible speed. Meaning that today, defending local government networks from cyber attacks is an ever-evolving battle that never stops. Cyber threats, including hackers, proxy groups and threat actors can take advantage of system vulnerabilities within days of them being discovered, and successful techniques will rapidly spread among criminal communities. Scary, right? With

How cyber threat intelligence sharing can benefit the government sector Read More »